Feeds

Graphene breakthrough threatens silicon's chip glory

This time they mean it

Security for virtualized datacentres

For years graphene has proved a cruel temptress for the semiconductor avant garde. The material - a layer of carbon atoms grouped in the ever popular honeycomb lattice - promised major performance gains over silicon. The problem with the stuff, however, has been arranging it in a large enough layer to replicate the 8- to 12-inch circular wafers favored by the major chip makers.

Some researchers at Princeton University believe they've overcome this problem by routing around it altogether. Stephen Chou, a professor of electrical engineering at Princeton, and his big brained underlings decided to pop small crystals of graphene "only in the active areas of the chip."

We'll let the wise people at Princeton explain the ins and outs.

In their new method, the researchers make a special stamp consisting of an array of tiny flat-topped pillars, each one-tenth of a millimeter wide. They press the pillars against a block of graphite (pure carbon), cutting thin carbon sheets, which stick to the pillars. The stamp is then removed, peeling away a few atomic layers of graphene.

Finally, the stamp is aligned with and pressed against a larger wafer, leaving the patches of graphene precisely where transistors will be built. The technique is like printing, Chou said. By repeating the process and using variously shaped stamps (the researchers also made strips instead of round pillars), all the active areas for transistors are covered with single crystals of graphene.

One innovation that made the technique possible was to coat the stamp with a special material that sticks to carbon when it is cold and releases when it is warm, allowing the same stamp to pick up and release the graphene.

Excited by their new technique, Chou and friends then went ahead and built transistors right onto the printed graphene crystals. Apparently, this resulted in a 10x boost over silicon transistors in moving, er, "electronic holes," which is a subject about which we won't claim deep knowledge.

The researchers believe the technology could make its way very quickly into devices such as cell phones "that require high power output."

“What we have done is shown that this approach is possible; the next step is to scale it up,” Chou said.

There's a paper on the new technology, but it's locked behind this abstract. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.