email US



PUF Academy

Professional Tutorial Platform of

Hardware Security Design Practice

The Latest Online Courses

Hardware Security Standards & Regulations

  • NIST Certification Standards

  • FIPS 140-2 (CAVP/CMVP)

  • Common Criteria

  • EU/US Regulation on Security

  • Government Funded R&D Projects

Hardware Root of Trust

  • Physical Unclonable Functions

  • Unique ID

  • Key Storage and Management

  • True Random Number Generator

  • The Functions of a Root of Trust

    • Integrity & Authentication​

    • Digital Signature

    • Encryption & Decryption

    • Secure Boot

Hardware Security Ecosystem

  • Within a Hardware Root of Trust

  • Google/MS Ecosystem

  • Notable Architectures

    • ARM - Trust Zone​

    • NXP - SE

  • PUF-based Open Platform

Marble Surface

Invited Lecturers

Dr. Albert Jeng

  • 30+ years of consulting and academic experience and 50+ papers published in international journals

  • Specialize in cloud computing, IoT, big data, RFID and wireless communications security, computer networking, secure protocols, applied cryptography, and information system security  

Dr. Evans Yang

  • Vice President of eMemory and PUFsecurity

  • Hold 150+ patents and published 50+ technical papers

  • Specialize in PUF and OTP technology.

  • One of the inventors in eMemory proprietary NVM technology portfolios

Dr. Shih-Li Hsu

  • Senior CTO of  PUFsecurity

  • 30+ years of experience in solution architecture and performance engineering

  • Specialize in cryptographic algorithms (AES, MD5, RSA), and digital identity across the internet, distributive network

Recommended Articles

The good, the bad and the ugly of hardware security

To choose or not to choose hardware-based security is a big decision for every company to make regarding protecting their highly important sensitive information from unauthorized access. The focus of this article is on the “good”, “bad” and the “ugly” of hardware-based security.

The Promise of Formal Methods to PUF Security Assurance

We will first discuss the importance of providing high security assurance in PUF, then address the potential vulnerabilities of PUFs and the limitations of the existing PUF security testing/verification approaches. Finally, we will assert why and how formal methods can be used to significantly improve the security verification of PUF.

Build Trust in Silicon: A Myth or a Reality?

In this column, we will first discuss the importance of providing TEE & HRoT as a firm foundation for electronic systems security. Next, we will address issues of trust on chip and how to build trust in silicon. Third, we will provide an overview on the US and EU R&D projects on chip security. 

Marble Surface

About PUF Academy

As the world evolves, technology will undoubtedly improve in conjunction to the world around us. With changes in technology come changes in the security field. More and more news reports point towards one thing: technology can be vulnerable. How do we protect our devices and privacy? How do we ensure that we do not compromise innovation, convenience, and possibilities? To answer these questions, PUFsecurity established PUF Academy to educate you on why hardware security is important, and to teach you how to use PUF to better secure your devices. Join us at PUF Academy to learn how you can secure the connected world.  


PUF Academy offers you a chance to learn more about cybersecurity, hardware security, and PUF applications. Whether you are looking to enhance your knowledge in the security field, or interested in learning how PUF can benefit your designs, our courses are open to all fields and disciplines. You can take these courses at any point of your career journey. 


We also have blogs, forums, and other social media where you can access resources and interact with your peers and instructors to build upon knowledge and enhance your learning experience.




Your feedback makes PUF Academy better