I Am tRoot
Elliptic Technologies Delivers Hardware Root of Trust
Sometimes even the circuit designer doesn’t know how the chip works. And that can be a good thing.
If you’re designing a chip or a system that includes security features, anti-tampering mechanisms, DRM protection, or defenses against DPA attacks, it’s probably better if you don’t know how it all works. That kind of stuff is mysterious. Secret. Black magic. And there are practitioners of these dark arts who are far more skilled than mortals like you or me. For they dwell in the deep places, apart from the rest, shunning the daylight and the company of men. And we call them Elliptic Technologies.
To read the full article, click here
Related Semiconductor IP
- ECDSA (Elliptic Curve Digital Signature) IP Core
- ECC7 Elliptic Curve Processor for Prime NIST Curves
- Elliptic Curve Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
- Elliptic Curve Cryptography IP
Related Blogs
- Trust at the Core: A Deep Dive into Hardware Root of Trust (HRoT)
- Hardware Root of Trust: Everything you need to know
- Rambus and the OCP: Tackling Cloud Data Security with a Hardware Root of Trust
- Rambus RT-660 Root of Trust IP Achieves FIPS 140-3 Certification
Latest Blogs
- A Repeatable Framework for Hardware Security Assurance
- Inside the SiFive Performance™ P570 Gen 3: High Performance Efficiency for Next-Generation Consumer and Commercial Applications
- What the steam engine can teach us about modern chip design
- Automotive silicon in the era of AI, functional safety, and cybersecurity
- JPEG XS Officially Joins GenICam, The Machine Vision Standard Managed By EMVA