Back to home
Technology

SiGeSn SBFETs at Cryogenic Temperatures (Tu Wien et al)

Source

SemiEngineering

Published

TL;DR

AI Generated

Researchers from TU Wien, Johannes Kepler University, Universidad de Granada, and Max Planck Institute for Sustainable Materials published a technical paper on "A Cryogenic Ultra-Thin Body SiGeSn Transistor." The paper discusses the development of transistors capable of operating at cryogenic temperatures, essential for efficient qubit control in quantum computing. By enhancing Si-based Schottky junction field-effect transistors with ultra-thin SiGeSn layers and utilizing a multi-gate transistor architecture, significant performance improvements were achieved. The research demonstrated enhanced drain current modulation, improved subthreshold slopes, and reduced threshold voltages at cryogenic temperatures, making the system promising for cryogenic computing applications.

Read Full Article

Similar Articles

Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists at KAUST have developed electronic devices made of gallium oxide that can function reliably in extreme temperatures from near absolute zero to 500°C. These devices have potential applications in space tech and quantum computing due to their ability to withstand extreme temperature swings. By using ultrawide-bandgap semiconductor beta-gallium oxide and heavily doping it with silicon atoms, the researchers created devices that can maintain electrical conduction even in cryogenic conditions. The team built transistors and logic inverters that operated reliably at temperatures as low as 2K, paving the way for the development of temperature-resistant devices for various technological applications.

Tom's Hardware
Yong Wang Turns Information Into Insights

Yong Wang Turns Information Into Insights

Yong Wang, a recipient of the IEEE Visualization and Graphics Technical Community Significant New Researcher Award, is recognized for his work in using artificial intelligence to revolutionize data visualization. Wang presented his insights at IEEE VIS 2025 in Vienna, emphasizing the importance of rethinking how data is visualized. His focus on human-computer collaboration, quantum computing, and AI showcases his innovative approach to transforming information into actionable insights.

IEEE Spectrum
In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe

A new ransomware family named Kyber claims to be quantum-safe by using ML-KEM encryption, a post-quantum cryptography standard. This encryption method is designed to be resistant to attacks by quantum computers, unlike traditional methods like Elliptic Curve and RSA. Security firm Rapid7 confirmed that Kyber uses the highest strength version of ML-KEM to encrypt victims' data with AES-256, making it the first known case of ransomware utilizing post-quantum cryptography. This development highlights the evolving tactics of cybercriminals to enhance the security of their malicious activities.

Ars Technica
Contrary to popular superstition, AES 128 is just fine in a post-quantum world

Contrary to popular superstition, AES 128 is just fine in a post-quantum world

AES 128 encryption is deemed secure in a post-quantum world, despite concerns raised by some about its vulnerability to quantum computing. The widely used AES 128 variant of the Advanced Encryption Standard has stood the test of time with no known vulnerabilities in its 30-year history. While amateur cryptographers have theorized about potential weaknesses using Grover's algorithm, the reality is that breaking AES 128 would still require an unfeasible amount of time and resources, making it a reliable choice for encryption. The key lies in the complexity of brute-force attacks and the inability of quantum computers to parallelize the workload effectively.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.