Ask the Experts: CryptoManager Root of Trust
On this episode of Ask the Experts, we chat with Parvez Shaik about the latest developments in security and the concept of the root of trust. Watch this video to learn about the importance of addressing supply chain vulnerabilities, the advantages of a hardware root of trust, and the new features of the third-generation CryptoManager Root of Trust products.
Key Topics in this episode:
- What is the current threat environment faced by chip and system makers?
- What is a root of trust and its role in security?
- What are the advantages of implementing a root of trust in hardware?
- What’s new in the third-generation CryptoManager Root of Trust?
Related Semiconductor IP
- Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
- Quantum Safe, ISO 21434 Automotive-grade Programmable Hardware Security Module
- Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
- Root of Trust
- Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
Related Videos
- Secure RISC-V Processor for Root of Trust
- RISC-V at NVIDIA: One Architecture, Dozens of Applications, Billions of Processors
- The Evolution of HBM
- Managing the Massive Data Throughput: AI-Based Designs and The Value of NoC Tiling