Ask the Experts: PUF-Based Security
BongHo Kang, Chief Technology Officer at ICTK, shares his insights with us on the state of electronic security and discusses the importance of hardware-level protection to counter increasingly sophisticated threats.
Watch this video to learn how a PUF, also known as a physically unclonable function, and Root of Trust solution provides excellent protection against cryptographic and side-channel attacks.
Related Semiconductor IP
- Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
- Digital PUF IP
- PUF IP
- PUF FPGA-Xilinx Premium with key wrap
- PUF FPGA-Xilinx Base
Related Videos
- Security From Chip-To-Cloud with PQC (Post Quantum Cryptography)
- Using Formal For RISC-V Security
- Beyond CNSA 2.0: The Expanding Horizon of Post-quantum Security
Latest Videos
- Powering the AI Supercycle: Design for AI and AI for Design - Anirudh Devgan
- Scaling AI from Edge to Data Center with SiFive RISC-V Vectors
- Paving the Road to Datacenter-Scale RISC-V
- Enhancing Data Center Architectures with PCIe® Retimers, Redrivers and Switches
- How UCIe 3.0 Redefining Chiplet Architecture: From Protocol to Platform