Ask the Experts: PUF-Based Security
BongHo Kang, Chief Technology Officer at ICTK, shares his insights with us on the state of electronic security and discusses the importance of hardware-level protection to counter increasingly sophisticated threats.
Watch this video to learn how a PUF, also known as a physically unclonable function, and Root of Trust solution provides excellent protection against cryptographic and side-channel attacks.
Related Semiconductor IP
- Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
- Digital PUF IP
- PUF IP
- PUF FPGA-Xilinx Premium with key wrap
- PUF FPGA-Xilinx Base
Related Videos
- Security From Chip-To-Cloud with PQC (Post Quantum Cryptography)
- Using Formal For RISC-V Security
- Beyond CNSA 2.0: The Expanding Horizon of Post-quantum Security
Latest Videos
- How UCIe 3.0 Redefining Chiplet Architecture: From Protocol to Platform
- Teradyne Testimonial: Silicon Creations' 16nm SerDes Enables Fastest TTM and Most Cost-Effective Teradyne ASIC Development To-Date
- Webinar: Unpacking System Performance – Supercharge Your Systems with Lossless Compression IPs
- Arm: From Cloud-to-Car Architecture
- High Performance RISC-V is here!