| Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security | Book | 2024 - 09 - 20 | | book | anti-tampering puf pufrt |
| Hardware Security Book Series 2: PUF-based Solutions and Applications | Book | 2024 - 09 - 13 | | book | puf pufrt |
| Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair | Article | 2024 - 07 - 31 | | article | otp root-of-trust sram-repair |
| Hardware Security Book Series 1: Quantum Tunneling PUF | Book | 2024 - 04 - 30 | | book | puf |
| Embracing a More Secure Era with TLS 1.3 | Article | 2024 - 04 - 01 | | article | iot pufcc7 root-of-trust security tls |
| Post-Quantum Cryptography (PQC) – On the Road to Preparedness | Article | 2023 - 12 - 22 | | article | cryptogaphy postquantumcryptography pqc root-of-trust |
| The Challenge of Automotive Hardware Security Deployment | Article | 2023 - 09 - 27 | | article | hardware-security puf root-of-trust |
| Securing System-on-Chips: Hardware Protection in the Age of Chiplets | Article | 2023 - 05 - 01 | | article | chiplet hardware-security puf root-of-trust |
| Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor | White Paper | 2023 - 03 - 21 | | white-paper | arm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2 |
| Set-Top Boxes are a growing Cybersecurity Threat | Article | 2022 - 11 - 23 | | article | secure-otp stb |
| Securing the AIoT: Safeguarding AI at the Edge | Article | 2022 - 08 - 11 | | article | hardware-security pufcc |
| Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory | Webinar | 2022 - 07 - 19 | | webinar | flash-protection hardware-security root-of-trust |
| Why Hardware Root of Trust Needs Anti-Tampering Design | White Paper | 2022 - 04 - 18 | | white-paper | anti-tampering puf pufrt |
| Software-Defined Everything doesn’t mean Software-Only Security | Article | 2022 - 04 - 06 | | article | hardware-security |
| TPM 2.0-Ready: Top Security with PUFcc | Article | 2022 - 03 - 22 | | article | hardware-security pufcc |
| PUFrt: Solving Chip Security’s Weakest Link | White Paper | 2021 - 12 - 20 | | white-paper | hardware-security puf pufrt root-of-trust |
| Securing the IC Supply Chain – Integrating PUF-Based hardware security | Article | 2021 - 10 - 06 | | article | hardware-security puf root-of-trust supply-chain |
| Adopting PUF to Implement Zero Trust Architecture | Article | 2021 - 09 - 30 | | article | hardware-security puf root-of-trust zero-trust |
| PUFcc: An Essential Crypto Coprocessor for RISC-V | White Paper | 2021 - 09 - 16 | | white-paper | crypto-coprocessor hardware-security pufcc risc-v-architechure |
| How PUF-based RoT Can Solve IoT Security Issues | Article | 2021 - 09 - 10 | | article | hardware-security root-of-trust |
| Webinar: The Secure Coprocessor for Secure Supply Chain | Webinar | 2021 - 06 - 11 | | webinar | crypto-coprocessor hardware-security pufcc root-of-trust |
| Webinar: PUFcc, The PUF-based Crypto Coprocessor | Webinar | 2021 - 06 - 10 | | webinar | crypto-coprocessor hardware-security pufcc root-of-trust |
| Talk: Chip Fingerprints Realize Safer Chip Applications and Services | Video | 2021 - 06 - 08 | | video | crypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust |
| Vital Ways to Prevent a Cyberattack | Article | 2021 - 05 - 05 | | article | hardware-security |
| Security Innovations That Are Helping Businesses in 2021 | Article | 2021 - 03 - 17 | | article | puf |
| Standardized PUF-based Solution for Device eID | Article | 2021 - 03 - 02 | | article | crypto-coprocessor hardware-security puf root-of-trust |
| PUF is a Hardware Solution for the Sunburst Hack | Article | 2021 - 01 - 28 | | article | hardware-security puf |
| 2020 Security on Chip Tech Forum Highlights | Article | 2020 - 12 - 28 | | article | hardware-security |
| 安全加密協处理器: PUFcc | Article | 2020 - 12 - 16 | | article | crypto-coprocessor hardware-security puf root-of-trust |
| 量子穿隧PUF信任根: PUFrt | Article | 2020 - 12 - 11 | | article | hardware-security puf root-of-trust |
| PUF Series 6: The Four Angles of Examining PUF | Article | 2020 - 09 - 15 | | article | puf |
| PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application | Article | 2020 - 09 - 14 | | article | hardware-security puf root-of-trust |
| PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust | Article | 2020 - 06 - 22 | | article | hardware-security puf root-of-trust |
| PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF | Article | 2020 - 06 - 16 | | article | puf |
| PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF | Article | 2020 - 06 - 15 | | article | puf |
| PUF Series 1: SRAM PUF is Increasingly Vulnerable | Article | 2020 - 06 - 14 | | article | puf |
| RoT: The Foundation of Security | Article | 2020 - 05 - 14 | | article | hardware-security puf root-of-trust |
| Build Trust in Silicon: A Myth or a Reality? | Article | 2020 - 04 - 23 | | article | hardware-security root-of-trust |
| Is Blockchain the Silver Bullet of IoT Security? | Article | 2020 - 01 - 15 | | article | hardware-security |
| Experts Meet on Imperatives of Hardware Security | Article | 2019 - 11 - 26 | | article | hardware-security puf |
| The Promise of Formal Methods to PUF Security Assurance | Article | 2019 - 11 - 13 | | article | hardware-security puf |
| PUF: A Crucial Technology for AI and IoT | Article | 2019 - 10 - 15 | | article | puf |
| “To be or not to be?” & “To be what?” those are two big questions for Libra! | Article | 2019 - 09 - 12 | | article | crypto-currency |
| The good, the bad and the ugly of hardware security | Article | 2019 - 09 - 11 | | article | hardware-security |