Setting a Foundation for Security with ReRAM
Today we are surrounded by an ever-increasing array of connected devices. Electronic payments are becoming more popular, and we are keeping more and more personal information in the cloud. At the same time, risks continue to rise as hackers get better and better at breaking down security schemes.
Regardless of the end application, security must be based on a multi-layered approach starting with the deepest embedded hardware. This starts within the manufacturing process of the chips themselves and includes a broad range of hardware primitives serving as security keys such as True Random Number Generator (TRNG) and physical unclonable functions (PUFs).
To read the full article, click here
Related Semiconductor IP
- Nano power DC-DC converter with ultra-low quiescent current and high efficiency at light load in TSMC 40uLPeF
- NANO POWER CRYSTAL OSCILLATOR [VAVDD = 1.62-3.63V; VDVDD = 0.81-1.21V; FXTAL = 32768Hz]
- RTC Real time Clock With Oscillator Nano Power Series
- RTC Real time Clock With Oscillator Nano Power Series
- RTC Real time Clock With Oscillator Nano Power Series
Related Blogs
- ReRAM-Powered Edge AI: A Game-Changer for Energy Efficiency, Cost, and Security
- Upgrade the Raspberry Pi for AI with a Neuromorphic Processor
- Root of Trust: A Security Essential for Cyber Defense
- Rivian’s autonomy breakthrough built with Arm: the compute foundation for the rise of physical AI
Latest Blogs
- Satellite communications are no longer as secure as assumed
- Why Hardware Monitoring Needs Infrastructure, Not Just Sensors
- Why Post-Quantum Cryptography Doesn’t Replace Classical Cryptography
- The Silent Guardian of AI Compute - PUFrt Unifies Hardware Security and Memory Repair to Build the Trust Foundation for AI Factories
- Heterogeneous NPU Data Movement Tax: Intel's Own Slides Tell the Story