Skip to content
PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

  • Products
  • Technology
  • Resources
  • Company
    • Newsroom
    • About Us
    • Markets
    • Careers
    • Contact
test drive
  • En

Crypto Coprocessor

2022 - 11 - 23

Crypto Coprocessor

A Crypto Coprocessor is a dedicated hardware module that accelerates cryptographic operations on a device and provides a reliable foundation to build a security sub-system on a chip.

2022 - 11 - 23

UID

In eu molestie eros. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus.

2022 - 11 - 23

HUK

In eu molestie eros. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus.

2022 - 11 - 23

Driver

What is a Driver? A device driver is a widely used software component that helps hardware interact with operation systems (Linux, RTOS, etc.). The driver is responsible for the hardware available, and all issues about using the hardware are left to the applications.   This allows the driver provides an interface to communicate between the user space […]

2022 - 11 - 23

AES

AES: The Advanced Encryption Standard The Advanced Encryption Standard (AES) is a symmetric encryption algorithm established by the U.S National Institute of Standards and Technology (NIST) in 2001. It is widely adopted today by governments and enterprises to protect sensitive electronic data and secure network communications. Symmetric Key AES uses the same key to encrypt […]

2022 - 11 - 23

API

API: Application Programming Interface API (Application Programming Interface) is the mechanism enabling two software components to communicate with each other. One software component can utilize the services of another by calling the provided APIs. As more and more applications require security functions for connection or data safety, the Security APIs provide an application-level programming interface for […]

2022 - 08 - 30

ECC

ECC: Elliptic-Curve Cryptography In contrast to Symmetric Key schemes such as AES (Advanced Encryption Standard), the asymmetric key scheme contains a key pair, the public key, and the private key. This is also known as public key cryptography. Asymmetric Key Complex mathematical problems underpin the asymmetric key construction, which allows the private key to derive […]

2022 - 08 - 30

Hash Functions

Hash functions are an essential part of the cybersecurity ecosystem. They are used frequently, for example, as a key component of blockchain management for cryptocurrencies. A hash is a mathematical function that maps input values of arbitrary length to output values of fixed length. In other words, it can create a short digest or digital […]

Recent Posts

Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor

Set-Top Boxes are a growing Cybersecurity Threat

Securing the AIoT: Safeguarding AI at the Edge

Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory

PUFef Datasheet

Tags

anti-tampering Arm Crypto Coprocessor crypto currency embedded flash Flash Protection Hardware Security PSA Certified PUF PUFcc PUFrt RISC-V Architechure Root of Trust Secure OTP STB Supply Chain White Paper Zero Trust

Subscribe to our Newsletter!

    Your address email

    • PUFrt
    • Secure OTP
    • PUFcc
    • Flash Protection
    • Evaluation Kits
    • Newsroom
    • About us
    • Markets
    • Careers
    • Contact
    • Terms of Use
    • Privacy Policy

    © 2019 - 2023 pufsecurity. All Rights Reserved.