Setting a Foundation for Security with ReRAM
Today we are surrounded by an ever-increasing array of connected devices. Electronic payments are becoming more popular, and we are keeping more and more personal information in the cloud. At the same time, risks continue to rise as hackers get better and better at breaking down security schemes.
Regardless of the end application, security must be based on a multi-layered approach starting with the deepest embedded hardware. This starts within the manufacturing process of the chips themselves and includes a broad range of hardware primitives serving as security keys such as True Random Number Generator (TRNG) and physical unclonable functions (PUFs).
To read the full article, click here
Related Semiconductor IP
- Nano power DC-DC converter with ultra-low quiescent current and high efficiency at light load in TSMC 40uLPeF
- RTC Real time Clock With Oscillator Nano Power Series
- RTC Real time Clock With Oscillator Nano Power Series
- OSC Ring Oscillator Programmable Nano Power Series
- OSC Ring Oscillator Programmable Nano Power Series
Related Blogs
- ReRAM-Powered Edge AI: A Game-Changer for Energy Efficiency, Cost, and Security
- Upgrade the Raspberry Pi for AI with a Neuromorphic Processor
- Root of Trust: A Security Essential for Cyber Defense
- Rivian’s autonomy breakthrough built with Arm: the compute foundation for the rise of physical AI
Latest Blogs
- Ensuring reliability in Advanced IC design
- A Closer Look at proteanTecs Health and Performance Management Solutions Portfolio
- Enabling Memory Choice for Modern AI Systems: Tenstorrent and Rambus Deliver Flexible, Power-Efficient Solutions
- Verification Sanity in Chiplets & Edge AI: Avoid the “Second Design” Trap
- Embedded Security explained: Cryptographic Hash Functions