Control of the Schottky barrier height in monolayer WS2 FETs using molecular doping (NIST)


A new research paper titled "Control of the Schottky barrier height in monolayer WS2 FETs using molecular doping" was published by researchers at NIST, Theiss Research, Naval Research Laboratory, and Nova Research. Abstract: "The development of processes to controllably dope two-dimensional semiconductors is critical to achieving next generation electronic and optoelectronic devices. Unde... » read more

CHIPS Act: U.S. Releases New Implementation Strategy


The U.S. Department of Commerce today published "A Strategy For The CHIPS For America Fund," outlining its implementation approach to distributing $50 billion from the CHIPS Act of 2022. Find the full strategy paper here, and the executive summary here. Program Goals The program's four primary goals are: Establish and expand domestic production of leading edge semiconductors in ... » read more

Week In Review: Manufacturing, Test


New fab construction At an event in Arizona, U.S. Commerce Secretary Gina Raimondo urged states to compete for funding made available for producing semiconductors by the U.S. federal government. Indeed, several companies are already doing just that. The latest developments include: Micron plans to invest approximately $15 billion through 2030 for a new memory fab near its existing headquart... » read more

Week In Review: Auto, Security, Pervasive Computing


The great EV ramp EV-related developments are everywhere. California’s move to ban sales of new internal-combustion vehicles by 2035, and the U.S. government’s sweeping embrace of clean-energy, are in lockstep with recent moves by the auto industry and related supply chains, as well as cutting-edge research. One of the big breakthroughs is the ability to charge an EV in 10 minutes witho... » read more

Technical Paper Round-up: August 8


New technical papers added to Semiconductor Engineering’s library this week. [table id=44 /] Semiconductor Engineering is in the process of building this library of research papers. Please send suggestions (via comments section below) for what else you’d like us to incorporate. If you have research papers you are trying to promote, we will review them to see if they are a good fit for... » read more

Reporting and Benchmarking Process For A 2D Semiconductor FET


New research paper titled "How to Report and Benchmark Emerging Field-Effect Transistors" was published from researchers at NIST, Purdue University, UCLA, Theiss Research, Peking University, NYU, Imec, RWTH Aachen, and others. "Emerging low-dimensional nanomaterials have been studied for decades in device applications as field-effect transistors (FETs). However, properly reporting and compar... » read more

Post Quantum Cryptography Is Coming


Quantum computing has made big advances in recent years and experts agree that quantum computers capable of breaking 2048-bit RSA or 256-bit ECC will be built — it’s just a matter of time. In this white paper, we discuss the security algorithms NIST has selected for Post Quantum Cryptography (PQC) and their instantiation in Rambus security products. Download this white paper to learn: ... » read more

Week In Review: Design, Low Power


Tools, IP, design Infineon Technologies acquired NoBug, a provider of design verification services. The acquisition will help Infineon expand its IoT R&D business in eastern Europe. “This considerable increase in superior verification know-how lets Infineon offer its customers more of its leading products at a reduced time-to-market,” said Guenter Krasser, Vice President and Managing D... » read more

Week in Review: Auto, Security, Pervasive Computing


Automotive The European Union plans to approve sales of fully autonomous vehicles by the end of September, according to Politico. The legislative package will allow for the registration and sale of up to 1,500 vehicles per model per year in member countries. Level 4 autonomous vehicles are still in the development stage, but reducing human error in autos is a crucial part of the EU’s goal to... » read more

Chips Can Boost Malware Immunity


Security is becoming an increasingly important design element, fueled by increasingly sophisticated attacks, the growing use of technology in safety-critical applications, and the rising value of data nearly everywhere. Hackers can unlock automobiles, phones, and smart locks by exploiting system design soft spots. They even can hack some mobile phones through always-on circuits when they are... » read more

← Older posts Newer posts →