I Am tRoot
Elliptic Technologies Delivers Hardware Root of Trust
Sometimes even the circuit designer doesn’t know how the chip works. And that can be a good thing.
If you’re designing a chip or a system that includes security features, anti-tampering mechanisms, DRM protection, or defenses against DPA attacks, it’s probably better if you don’t know how it all works. That kind of stuff is mysterious. Secret. Black magic. And there are practitioners of these dark arts who are far more skilled than mortals like you or me. For they dwell in the deep places, apart from the rest, shunning the daylight and the company of men. And we call them Elliptic Technologies.
To read the full article, click here
Related Semiconductor IP
- ECC7 Elliptic Curve Processor for Prime NIST Curves
- Scalable RSA and Elliptic Curve Accelerator
- Elliptic Curve Cryptography IP
- Elliptic Curve Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
Related Blogs
- Trust at the Core: A Deep Dive into Hardware Root of Trust (HRoT)
- Hardware Root of Trust: Everything you need to know
- Rambus and the OCP: Tackling Cloud Data Security with a Hardware Root of Trust
- Rambus RT-660 Root of Trust IP Achieves FIPS 140-3 Certification
Latest Blogs
- Evolution of CXL PBR Switch in the CXL Fabric
- CNNs and Transformers: Decoding the Titans of AI
- How is RISC-V’s open and customizable design changing embedded systems?
- Imagination GPUs now support Vulkan 1.4 and Android 16
- From "What-If" to "What-Is": Cadence IP Validation for Silicon Platform Success