Skip to content
PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

  • Products
  • Technology
  • Resources
  • Company
    • Newsroom
    • About Us
    • Certifications and Awards
    • Markets
    • Careers
    • Contact
  • En

Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security

2024 - 09 - 20

Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security

Lead Author: Dr. Meng-Yi Wu, Dr. Kai-Hsin Chuang In a secure chip, the keys, which constitute the hardware root of trust (HRoT) of the chip, must be fully protected. An HRoT is the most important design in chip security, providing fundamental trust (root keys), hardware identification code (UID), hardware unique keys (HUK), and entropy. Consequently, […]

2024 - 09 - 13

Hardware Security Book Series 2: PUF-based Solutions and Applications

Lead Author: Lawrence Liu A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers […]

2022 - 04 - 18

Why Hardware Root of Trust  Needs Anti-Tampering Design

Foreword As the development of AIoT advanced in more diversified applications, such as artificial intelligence, image recognition, intelligent sensing, or smart healthcare, endpoint devices are exposed to more information security risks than ever. The technology boom also brings more security needs, so ensuring that devices are secure and trusted is critical. All layers of the […]

2021 - 12 - 20

PUFrt: Solving Chip Security’s Weakest Link

In the 19th century, Netherland’s cryptographer, Auguste Kerckhoff, created Kerckhoffs’s principle, stating that “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.”

Recent Posts

The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification

Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security

Hardware Security Book Series 2: PUF-based Solutions and Applications

Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair

Hardware Security Book Series 1: Quantum Tunneling PUF

Tags

anti-tampering Arm Chiplet Crypto Coprocessor crypto currency cryptogaphy Flash Protection Hardware Security IoT OTP postquantumcryptography PQC PSA Certified PUF PUFcc PUFcc7 PUFrt RISC-V Architechure Root of Trust Secure OTP security SRAM Repair STB Supply Chain TLS White Paper Zero Trust

Subscribe to our Newsletter!

    Your address email

    • PUFrt
    • Secure OTP
    • PUFcc
    • Flash Protection
    • PUFhsm
    • Newsroom
    • About us
    • Markets
    • Careers
    • Contact
    • Terms of Use
    • Privacy Policy
    • YouTube
    • Facebook
    • LinkedIn
    • Twitter

    © 2019 - 2025 pufsecurity. All Rights Reserved.