I Am tRoot
Elliptic Technologies Delivers Hardware Root of Trust
Sometimes even the circuit designer doesn’t know how the chip works. And that can be a good thing.
If you’re designing a chip or a system that includes security features, anti-tampering mechanisms, DRM protection, or defenses against DPA attacks, it’s probably better if you don’t know how it all works. That kind of stuff is mysterious. Secret. Black magic. And there are practitioners of these dark arts who are far more skilled than mortals like you or me. For they dwell in the deep places, apart from the rest, shunning the daylight and the company of men. And we call them Elliptic Technologies.
To read the full article, click here
Related Semiconductor IP
- ECC7 Elliptic Curve Processor for Prime NIST Curves
- Scalable RSA and Elliptic Curve Accelerator
- Elliptic Curve Cryptography IP
- Elliptic Curve Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
Related Blogs
- Hardware Root of Trust: Everything you need to know
- Rambus and the OCP: Tackling Cloud Data Security with a Hardware Root of Trust
- Rambus RT-660 Root of Trust IP Achieves FIPS 140-3 Certification
- Rambus CryptoManager Root of Trust Solutions Tailor Security Capabilities to Specific Customer Needs with New Three-Tier Architecture
Latest Blogs
- Designing the AI Factories: Unlocking Innovation with Intelligent IP
- Smarter SoC Design for Agile Teams and Tight Deadlines
- Automotive Reckoning: Industry Leaders Discuss the Race to Redefine Car Development
- Applied AI in Analog IC Design Migration
- LPDDR6: A New Standard and Memory Choice for AI Data Center Applications