Home > PUF Academy > Hardware Security Theory and Practices (2021)

PUFsecurity, a subsidiary of eMemory, is dedicated to innovating PUF-based security solutions.

Based on educating the market, PUFsecurity has gathered internal experts in various fields of R&D and marketing, including the inventor of NeoPUF, Dr. Meng Yi Wu, and his team as course instructors according to their expertise.

This course is divided into 4 major chapters that will enable you to :

1) Quickly understand common hardware security standards and regulations

2) Understand the types and applications of Physically Unclonable Functions (PUF)

3) Understand various hardware security practices and commercial considerations

4) Be familiar with the design architecture, functional units, implementation methods, and attack/protection methods of chip security

Enjoy the course !

熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔任課程講師。 這門課程分為四大章節,能夠讓你:

1) 快速讀懂常見硬體安全標準法規與規範

2) 了解物理不可複製功能(PUF)的種類與應用

3) 掌握各式硬體安全的實踐手法與商用考量

4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段

Introduction of Hardware Security Theory and Practices – 8-hour tutorial

Hardware Security Theory and Practices

PUFacademy | Security 303 | Ch1-1: FIPS 140-2 and CMVP

FIPS 140-2 and CMVP

PUFacademy | Security 303 | Ch1-2: Towards FIPS 140-3

Towards FIPS 140-3

PUFacademy | Security 303 | Ch1-3: CAVP and Security Objectives

CAVP and Security Objectives

PUFacademy | Security 303 | Ch1-4: Case studies: Attacks on Hardware Security

Case studies : Attacks on Hardware Security

PUFacademy | Security 303 | Ch1-5: NIST 800-131A – Algorithm and Key

NIST 800-131A – Algorithm and Key

PUFacademy | Security 303 | Ch1-6: NIST 800-22 Randomness Tests(I)

NIST 800-22 Randomness Tests

PUFacademy | Security 303 | Ch1-7: NIST 800-90 Randomness Tests (II)

NIST 800-90 Randomness Tests(II)

PUFacademy | Security 303 | Ch1-8: California Senate Bill No. 327

California Senate Bill No. 327

PUFacademy | Security 303 | Ch1-9: DCMS Code of Practice

DCMS Code of Practice

PUFacademy | Security 303 | Ch2-1: Hardware Root of Trust

Hardware Root of Trust

PUFacademy | Security 303 | Ch 2-2: Physically Unclonable Functions (PUF)

Physically Unclonable Functions (PUF)

PUFacademy | Security 303 | Ch 2-3: PUF Properties

PUF Properties

PUFacademy | Security 303 | Ch 2-4: PUF Implementations

PUF Implementations

PUFacademy | Security 303 | Ch 2-5: A Quantum Tunneling PUF

A Quantum Tunneling PUF

PUFacademy | Security 303 | Ch 2-6: PUF-based Applications(I)

PUF-based Applications (I)

PUFacademy | Security 303 | Ch 2-7: PUF-based Applications(II)

PUF-based Applications (II)

PUFacademy | Security 303 | Ch 2-8: PUF-based Hardware Root ot Trust(I)

PUF-based Hardware Root ot Trust (I)

PUFacademy | Security 303 | Ch 2-9: PUF-based Hardware Root ot Trust(II)

PUFacademy | Security 303 | Ch 3-1: Background of Hardware Security(I)

Backgraound of Hardware Security (I)

PUFacademy | Security 303 | Ch 3-2: Background of Hardware Security(II)

Backgraound of Hardware Security (II)

PUFacademy | Security 303 | Ch 3-3: Building a Hardware Root-of-Trust(I)

Building a Hardware Root-of-Trust (I)

PUFacademy | Security 303 | Ch 3-4: Building a Hardware Root-of-Trust(II)

Building a Hardware Root-of-Trust(II)

PUFacademy | Security 303 | Ch 3-5: eFuse vs. Anti-Fuse Storage

eFuse vs. Anti-Fuse Storage

PUFacademy | Security 303 | Ch 3-6: Key Generation PUF Solutions(I)

Key Generation PUF Solutions(I)

PUFacademy | Security 303 | Ch 3-7: Key Generation PUF Solutions(II)

Key Generation PUF Solutions(II)

PUFacademy | Security 303 | Ch 3-8: Cryptographic Solutions

Cryptographic Solutions

PUFacademy | Security 303 | Ch 3-9: Hardware Security Platform

Hardware Security Platform

PUFacademy | Security 303 | Ch 4-1: Chip Security Considerations PSA as an example

Chip Security Considerations PSA as an example

PUFacademy | Security 303 | Ch 4-2: Introduction to Hash Function

Introduction to Hash Function

PUFacademy | Security 303 | Ch 4-3: Introduction to Symmetric Key Algorithm

Introduction to Symmetric Key Algorithm

PUFacademy | Security 303 | Ch 4-4: Public Key Cryptography

Public Key Cryptography

PUFacademy | Security 303 | Ch 4-5: Software Attacks & Counter

Software Attacks & Counter

PUFacademy | Security 303 | Ch 4-6: Malicious Attacks

Malicious Attacks

PUFacademy | Security 303 | Ch 4-7: PUF-based Coprocessor (I)

PUF-based Coprocessor (I)

PUFacademy | Security 303 | Ch 4-8: PUF-based Coprocessor (II)

PUF-based Coprocessor (II)

You can also find other videos that could interest you on our Youtube Channel.

Go to check and subscribe to us!