• Skip to main content
  • Skip to search
  • Skip to footer
Cadence Home
  • This search text may be transcribed, used, stored, or accessed by our third-party service providers per our Cookie Policy and Privacy Policy.

  1. Community Forums
  2. Mixed-Signal Design
  3. How to increase Cadence Spectre simulation speed?

Stats

  • Locked Locked
  • Replies 0
  • Subscribers 64
  • Views 11052
  • Members are here 0
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to increase Cadence Spectre simulation speed?

birjit
birjit over 4 years ago

I am trying to plot power traces using Cadence Spectre for my circuit for a clock period of 100 MHz (T = 10ns). I am using a step size of 1ps and want to obtain 10,000 samples per clock period (and 5 million samples in total for 500 clocks) as per the following instructions in the .scs file:

//
simulator lang = spectre
global 0 VDD VSS VBN VBP
vlog_include "aes_oneround_m.v" supply0 = VSS supply1 = VDD insensitive = no
include "spice.cir"
vec_include "input_500.vec"
include "mos.scs"
X1 plaintext\[0\] plaintext\[1\] plaintext\[2\] plaintext\[3\] plaintext\[4\] plaintext\[5\] plaintext\[6\] plaintext\[7\] plaintext\[8\] plaintext\[9\] plaintext\[10\] plaintext\[11\] plaintext\[12\]
+ plaintext\[13\] plaintext\[14\] plaintext\[15\] plaintext\[16\] plaintext\[17\] plaintext\[18\] plaintext\[19\] plaintext\[20\] plaintext\[21\] plaintext\[22\] plaintext\[23\] plaintext\[24\] plaintext\[25\] plaintext\[26\] plaintext\[27\] plaintext\[28\] plaintext\[29\] plaintext\[30\] plaintext\[31\] plaintext\[32\] plaintext\[33\] plaintext\[34\] plaintext\[35\] plaintext\[36\] plaintext\[37\] plaintext\[38\] plaintext\[39\] plaintext\[40\] plaintext\[41\] plaintext\[42\] plaintext\[43\] plaintext\[44\] plaintext\[45\] plaintext\[46\] plaintext\[47\] plaintext\[48\] plaintext\[49\] plaintext\[50\] plaintext\[51\] plaintext\[52\] plaintext\[53\] plaintext\[54\] plaintext\[55\] plaintext\[56\] plaintext\[57\] plaintext\[58\] plaintext\[59\] plaintext\[60\] plaintext\[61\] plaintext\[62\] plaintext\[63\] plaintext\[64\] plaintext\[65\] plaintext\[66\] plaintext\[67\] plaintext\[68\] plaintext\[69\] plaintext\[70\] plaintext\[71\] plaintext\[72\] plaintext\[73\] plaintext\[74\] plaintext\[75\] plaintext\[76\] plaintext\[77\] plaintext\[78\] plaintext\[79\] plaintext\[80\] plaintext\[81\] plaintext\[82\] plaintext\[83\] plaintext\[84\] plaintext\[85\] plaintext\[86\] plaintext\[87\] plaintext\[88\] plaintext\[89\] plaintext\[90\] plaintext\[91\] plaintext\[92\] plaintext\[93\] plaintext\[94\] plaintext\[95\] plaintext\[96\] plaintext\[97\] plaintext\[98\] plaintext\[99\] plaintext\[100\] plaintext\[101\] plaintext\[102\] plaintext\[103\] plaintext\[104\] plaintext\[105\] plaintext\[106\] plaintext\[107\] plaintext\[108\] plaintext\[109\] plaintext\[110\] plaintext\[111\] plaintext\[112\] plaintext\[113\] plaintext\[114\] plaintext\[115\] plaintext\[116\] plaintext\[117\] plaintext\[118\] plaintext\[119\] plaintext\[120\] plaintext\[121\] plaintext\[122\] plaintext\[123\] plaintext\[124\] plaintext\[125\] plaintext\[126\] plaintext\[127\] key\[0\] key\[1\] key\[2\] key\[3\] key\[4\] key\[5\] key\[6\] key\[7\] key\[8\] key\[9\] key\[10\] key\[11\] key\[12\] key\[13\] key\[14\] key\[15\] key\[16\] key\[17\] key\[18\] key\[19\] key\[20\] key\[21\] key\[22\] key\[23\] key\[24\] key\[25\] key\[26\] key\[27\] key\[28\] key\[29\] key\[30\] key\[31\] key\[32\] key\[33\] key\[34\] key\[35\] key\[36\] key\[37\] key\[38\] key\[39\] key\[40\] key\[41\] key\[42\] key\[43\] key\[44\] key\[45\] key\[46\] key\[47\] key\[48\] key\[49\] key\[50\] key\[51\] key\[52\] key\[53\] key\[54\] key\[55\] key\[56\] key\[57\] key\[58\] key\[59\] key\[60\] key\[61\] key\[62\] key\[63\] key\[64\] key\[65\] key\[66\] key\[67\] key\[68\] key\[69\] key\[70\] key\[71\] key\[72\] key\[73\] key\[74\] key\[75\] key\[76\] key\[77\] key\[78\] key\[79\] key\[80\] key\[81\] key\[82\] key\[83\] key\[84\] key\[85\] key\[86\] key\[87\] key\[88\] key\[89\] key\[90\] key\[91\] key\[92\] key\[93\] key\[94\] key\[95\] key\[96\] key\[97\] key\[98\] key\[99\] key\[100\] key\[101\] key\[102\] key\[103\] key\[104\] key\[105\] key\[106\] key\[107\] key\[108\] key\[109\] key\[110\] key\[111\] key\[112\] key\[113\] key\[114\] key\[115\] key\[116\] key\[117\] key\[118\] key\[119\] key\[120\] key\[121\] key\[122\] key\[123\] key\[124\] key\[125\] key\[126\] key\[127\] clk
+ ciphertext\[0\] ciphertext\[1\] ciphertext\[2\] ciphertext\[3\] ciphertext\[4\] ciphertext\[5\] ciphertext\[6\] ciphertext\[7\] ciphertext\[8\]
+ ciphertext\[9\] ciphertext\[10\] ciphertext\[11\] ciphertext\[12\] ciphertext\[3\] ciphertext\[14\] ciphertext\[15\] ciphertext\[16\] ciphertext\[17\]
+ ciphertext\[18\] ciphertext\[19\] ciphertext\[20\] ciphertext\[21\] ciphertext\[22\] ciphertext\[23\] ciphertext\[24\] ciphertext\[25\] ciphertext\[26\]
+ ciphertext\[27\] ciphertext\[28\] ciphertext\[29\] ciphertext\[30\] ciphertext\[31\] ciphertext\[32\] ciphertext\[33\] ciphertext\[34\] ciphertext\[35\]
+ ciphertext\[36\] ciphertext\[37\] ciphertext\[38\] ciphertext\[39\] ciphertext\[40\] ciphertext\[41\] ciphertext\[42\] ciphertext\[43\] ciphertext\[44\]
+ ciphertext\[45\] ciphertext\[46\] ciphertext\[47\] ciphertext\[48\] ciphertext\[49\] ciphertext\[50\] ciphertext\[51\] ciphertext\[52\] ciphertext\[53\]
+ ciphertext\[54\] ciphertext\[55\] ciphertext\[56\] ciphertext\[57\] ciphertext\[58\] ciphertext\[59\] ciphertext\[60\] ciphertext\[61\] ciphertext\[62\]
+ ciphertext\[63\] ciphertext\[64\] ciphertext\[65\] ciphertext\[66\] ciphertext\[67\] ciphertext\[68\] ciphertext\[69\] ciphertext\[70\] ciphertext\[71\]
+ ciphertext\[72\] ciphertext\[73\] ciphertext\[74\] ciphertext\[75\] ciphertext\[76\] ciphertext\[77\] ciphertext\[78\] ciphertext\[79\] ciphertext\[80\]
+ ciphertext\[81\] ciphertext\[82\] ciphertext\[83\] ciphertext\[84\] ciphertext\[85\] ciphertext\[86\] ciphertext\[87\] ciphertext\[88\] ciphertext\[89\]
+ ciphertext\[90\] ciphertext\[91\] ciphertext\[92\] ciphertext\[93\] ciphertext\[94\] ciphertext\[95\] ciphertext\[96\] ciphertext\[97\] ciphertext\[98\]
+ ciphertext\[99\] ciphertext\[100\] ciphertext\[101\] ciphertext\[102\] ciphertext\[103\] ciphertext\[104\] ciphertext\[105\] ciphertext\[106\]
+ ciphertext\[107\] ciphertext\[108\] ciphertext\[109\] ciphertext\[110\] ciphertext\[111\] ciphertext\[112\] ciphertext\[113\] ciphertext\[114\]
+ ciphertext\[115\] ciphertext\[116\] ciphertext\[117\] ciphertext\[118\] ciphertext\[119\] ciphertext\[120\] ciphertext\[121\] ciphertext\[122\]
+ ciphertext\[123\] ciphertext\[124\] ciphertext\[125\] ciphertext\[126\] ciphertext\[127\] aes_oneround

VDC (VDD 0) vsource dc=1.2 type=dc
v2 (VSS 0) vsource dc=0 type=dc
v4 (VBN 0) vsource dc=0 type=dc
v5 (VBP 0) vsource dc=1.2 type=dc
v6 (clk 0) vsource type=pulse val0=0 val1=1.2 delay=0 rise=0.05n fall=0.05n width=5n period=10n
mytran tran stop=5015n step=1p maxstep=1p errpreset=liberal method=gear2only compression=yes

save :pwr

The input vector file for the same is:

radix 44444444444444444444444444444444 44444444444444444444444444444444
io iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
vname plaintext[[0:127]] key[[0:127]]
tunit 1ns
trise 0.05
tfall 0.05
vih 1.2
vil 0.0
voh 0.9
vol 0.3
5 d57e806eaf6aafd00dd5eeabf403757b 00112233445566778899aabbccddeeff
15 6abf403757b557e806eaf755fa01babd 00112233445566778899aabbccddeeff
25 355fa01babdaabf403757baafd00dd5e 00112233445566778899aabbccddeeff
35 9aafd00dd5ed55fa01babdd57e806eaf 00112233445566778899aabbccddeeff

.

.

.

4995 ecf4e52480de9899bcf099e74d9635c4 00112233445566778899aabbccddeeff
5005 767a7292406f4c4cde784cf3a6cb1ae2 00112233445566778899aabbccddeeff

Finally, the run_wop file which is sourced for the execution of the code, has the following instructions:

spectre -64 ++aps +multithread osc.scs -o power_100MHz

However, this process seems to be very time-consuming ranging over many days. Kindly help me how to increase the processing speed of the code which has been put to run? Wish to know the commands which can help in this regard.

  • Cancel

Community Guidelines

The Cadence Design Communities support Cadence users and technologists interacting to exchange ideas, news, technical information, and best practices to solve problems and get the most from Cadence technology. The community is open to everyone, and to provide the most value, we require participants to follow our Community Guidelines that facilitate a quality exchange of ideas and information. By accessing, contributing, using or downloading any materials from the site, you agree to be bound by the full Community Guidelines.

© 2025 Cadence Design Systems, Inc. All Rights Reserved.

  • Terms of Use
  • Privacy
  • Cookie Policy
  • US Trademarks
  • Do Not Sell or Share My Personal Information