PUFsecurity, a subsidiary of eMemory, is dedicated to innovating PUF-based security solutions.
Based on educating the market, PUFsecurity has gathered internal experts in various fields of R&D and marketing, including the inventor of NeoPUF, Dr. Meng Yi Wu, and his team as course instructors according to their expertise.
This course is divided into 4 major chapters that will enable you to :
1) Quickly understand common hardware security standards and regulations
2) Understand the types and applications of Physically Unclonable Functions (PUF)
3) Understand various hardware security practices and commercial considerations
4) Be familiar with the design architecture, functional units, implementation methods, and attack/protection methods of chip security
Enjoy the course !
Introduction of Hardware Security Theory and Practices – 8-hour tutorial
PUFacademy | Security 303 | Ch1-1: FIPS 140-2 and CMVP
PUFacademy | Security 303 | Ch1-2: Towards FIPS 140-3
PUFacademy | Security 303 | Ch1-3: CAVP and Security Objectives
PUFacademy | Security 303 | Ch1-4: Case studies: Attacks on Hardware Security
PUFacademy | Security 303 | Ch1-5: NIST 800-131A – Algorithm and Key
PUFacademy | Security 303 | Ch1-6: NIST 800-22 Randomness Tests(I)
PUFacademy | Security 303 | Ch1-7: NIST 800-90 Randomness Tests (II)
PUFacademy | Security 303 | Ch1-8: California Senate Bill No. 327
PUFacademy | Security 303 | Ch1-9: DCMS Code of Practice
PUFacademy | Security 303 | Ch2-1: Hardware Root of Trust
PUFacademy | Security 303 | Ch 2-2: Physically Unclonable Functions (PUF)
PUFacademy | Security 303 | Ch 2-3: PUF Properties
PUFacademy | Security 303 | Ch 2-4: PUF Implementations
PUFacademy | Security 303 | Ch 2-5: A Quantum Tunneling PUF
PUFacademy | Security 303 | Ch 2-6: PUF-based Applications(I)
PUFacademy | Security 303 | Ch 2-7: PUF-based Applications(II)
PUFacademy | Security 303 | Ch 2-8: PUF-based Hardware Root ot Trust(I)
PUFacademy | Security 303 | Ch 2-9: PUF-based Hardware Root ot Trust(II)
PUFacademy | Security 303 | Ch 3-1: Background of Hardware Security(I)
PUFacademy | Security 303 | Ch 3-2: Background of Hardware Security(II)
PUFacademy | Security 303 | Ch 3-3: Building a Hardware Root-of-Trust(I)
PUFacademy | Security 303 | Ch 3-4: Building a Hardware Root-of-Trust(II)
PUFacademy | Security 303 | Ch 3-5: eFuse vs. Anti-Fuse Storage
PUFacademy | Security 303 | Ch 3-6: Key Generation PUF Solutions(I)
PUFacademy | Security 303 | Ch 3-7: Key Generation PUF Solutions(II)
PUFacademy | Security 303 | Ch 3-8: Cryptographic Solutions
PUFacademy | Security 303 | Ch 3-9: Hardware Security Platform
PUFacademy | Security 303 | Ch 4-1: Chip Security Considerations PSA as an example
PUFacademy | Security 303 | Ch 4-2: Introduction to Hash Function
PUFacademy | Security 303 | Ch 4-3: Introduction to Symmetric Key Algorithm
PUFacademy | Security 303 | Ch 4-4: Public Key Cryptography
PUFacademy | Security 303 | Ch 4-5: Software Attacks & Counter
PUFacademy | Security 303 | Ch 4-6: Malicious Attacks
PUFacademy | Security 303 | Ch 4-7: PUF-based Coprocessor (I)
PUFacademy | Security 303 | Ch 4-8: PUF-based Coprocessor (II)
You can also find other videos that could interest you on our Youtube Channel.
Go to check and subscribe to us!