Skip to content
PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

  • Products
  • Technology
  • Resources
  • Company
    • Newsroom
    • About Us
    • Markets
    • Careers
    • Contact
test drive
  • En

PUF

2022 - 01 - 06

PUF

The unique inborn fingerprint of each semiconductor device Physically unclonable functions (PUFs) are used in hardware security primarily for chip identification and authentication. PUFs for semiconductor devices utilize natural cellular-level variations inherent in silicon to create an unclonable, unique device response to a given input. Every chip ever produced has natural process variations that make […]

2022 - 01 - 05

Anti-tamper Design

Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.

2022 - 01 - 05

TRNG  

Aliquam ut eros congue, accumsan tellus et, eleifend tellus. Pellentesque in libero eu diam porttitor laoreet eu vulputate purus. Aliquam sit amet commodo purus, vitae dapibus justo.

2022 - 01 - 05

Quantum Tunneling

As the first step in establishing any cybersecurity ecosystem, the process of key generation must remain reliably secure. Software-based key generation algorithms introduce various risk factors into the process, such as key management and key injection, along with the added costs required to support such processes. Thus, the safest solution is the simplest, generating an […]

2022 - 01 - 04

Anti-Fuse OTP

What is OTP? One-Time-Programmable Memory (OTP) is a type of non-volatile memory (NVM), and for most applications, it is the industry standard for single-use memory. OTP replaces Read-only memory (ROM) in applications such as IDs, production records, encryption code, etc. It is also suitable for analog trimming, function selection, and parameter setting and has been […]

2022 - 01 - 04

Hardware Root of Trust

Trust (RoT) underpins all Secure Operations on a chip and protects its critical assets. It provides a unique and unforgeable foundation from which a device builds its security architecture and authenticate each computing layer, from hardware to application.

Recent Posts

Securing System-on-Chips: Hardware Protection in the Age of Chiplets

Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor

Set-Top Boxes are a growing Cybersecurity Threat

Securing the AIoT: Safeguarding AI at the Edge

Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory

Tags

anti-tampering Arm Chiplet Crypto Coprocessor crypto currency embedded flash Flash Protection Hardware Security PSA Certified PUF PUFcc PUFrt RISC-V Architechure Root of Trust Secure OTP STB Supply Chain White Paper Zero Trust

Subscribe to our Newsletter!

    Your address email

    • PUFrt
    • Secure OTP
    • PUFcc
    • Flash Protection
    • Evaluation Kits
    • Newsroom
    • About us
    • Markets
    • Careers
    • Contact
    • Terms of Use
    • Privacy Policy
    • YouTube
    • Facebook
    • LinkedIn
    • Twitter

    © 2019 - 2023 pufsecurity. All Rights Reserved.