| The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification | Article | 2024-11-26 | | article | otp root-of-trust sram-repair |
| Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security | Book | 2024-09-20 | | book | anti-tampering puf pufrt |
| Hardware Security Book Series 2: PUF-based Solutions and Applications | Book | 2024-09-13 | | book | puf pufrt |
| Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair | Article | 2024-07-31 | | article | otp root-of-trust sram-repair |
| Hardware Security Book Series 1: Quantum Tunneling PUF | Book | 2024-04-30 | | book | puf |
| Embracing a More Secure Era with TLS 1.3 | Article | 2024-04-01 | | article | iot pufcc7 root-of-trust security tls |
| Post-Quantum Cryptography (PQC) – On the Road to Preparedness | Article | 2023-12-22 | | article | cryptogaphy postquantumcryptography pqc root-of-trust |
| The Challenge of Automotive Hardware Security Deployment | Article | 2023-09-27 | | article | hardware-security puf root-of-trust |
| Securing System-on-Chips: Hardware Protection in the Age of Chiplets | Article | 2023-05-01 | | article | chiplet hardware-security puf root-of-trust |
| Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor | White Paper | 2023-03-21 | | white-paper | arm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2 |
| Set-Top Boxes are a growing Cybersecurity Threat | Article | 2022-11-23 | | article | secure-otp stb |
| Securing the AIoT: Safeguarding AI at the Edge | Article | 2022-08-11 | | article | hardware-security pufcc |
| Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory | Webinar | 2022-07-19 | | webinar | flash-protection hardware-security root-of-trust |
| Why Hardware Root of Trust Needs Anti-Tampering Design | White Paper | 2022-04-18 | | white-paper | anti-tampering puf pufrt |
| Software-Defined Everything doesn’t mean Software-Only Security | Article | 2022-04-06 | | article | hardware-security |
| TPM 2.0-Ready: Top Security with PUFcc | Article | 2022-03-22 | | article | hardware-security pufcc |
| PUFrt: Solving Chip Security’s Weakest Link | White Paper | 2021-12-20 | | white-paper | hardware-security puf pufrt root-of-trust |
| Securing the IC Supply Chain – Integrating PUF-Based hardware security | Article | 2021-10-06 | | article | hardware-security puf root-of-trust supply-chain |
| Adopting PUF to Implement Zero Trust Architecture | Article | 2021-09-30 | | article | hardware-security puf root-of-trust zero-trust |
| PUFcc: An Essential Crypto Coprocessor for RISC-V | White Paper | 2021-09-16 | | white-paper | crypto-coprocessor hardware-security pufcc risc-v-architechure |
| How PUF-based RoT Can Solve IoT Security Issues | Article | 2021-09-10 | | article | hardware-security root-of-trust |
| Webinar: The Secure Coprocessor for Secure Supply Chain | Webinar | 2021-06-11 | | webinar | crypto-coprocessor hardware-security pufcc root-of-trust |
| Webinar: PUFcc, The PUF-based Crypto Coprocessor | Webinar | 2021-06-10 | | webinar | crypto-coprocessor hardware-security pufcc root-of-trust |
| Talk: Chip Fingerprints Realize Safer Chip Applications and Services | Video | 2021-06-08 | | video | crypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust |
| Vital Ways to Prevent a Cyberattack | Article | 2021-05-05 | | article | hardware-security |
| Security Innovations That Are Helping Businesses in 2021 | Article | 2021-03-17 | | article | puf |
| Standardized PUF-based Solution for Device eID | Article | 2021-03-02 | | article | crypto-coprocessor hardware-security puf root-of-trust |
| PUF is a Hardware Solution for the Sunburst Hack | Article | 2021-01-28 | | article | hardware-security puf |
| 2020 Security on Chip Tech Forum Highlights | Article | 2020-12-28 | | article | hardware-security |
| 安全加密協处理器: PUFcc | Article | 2020-12-16 | | article | crypto-coprocessor hardware-security puf root-of-trust |
| 量子穿隧PUF信任根: PUFrt | Article | 2020-12-11 | | article | hardware-security puf root-of-trust |
| PUF Series 6: The Four Angles of Examining PUF | Article | 2020-09-15 | | article | puf |
| PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application | Article | 2020-09-14 | | article | hardware-security puf root-of-trust |
| PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust | Article | 2020-06-22 | | article | hardware-security puf root-of-trust |
| PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF | Article | 2020-06-16 | | article | puf |
| PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF | Article | 2020-06-15 | | article | puf |
| PUF Series 1: SRAM PUF is Increasingly Vulnerable | Article | 2020-06-14 | | article | puf |
| RoT: The Foundation of Security | Article | 2020-05-14 | | article | hardware-security puf root-of-trust |
| Build Trust in Silicon: A Myth or a Reality? | Article | 2020-04-23 | | article | hardware-security root-of-trust |
| Is Blockchain the Silver Bullet of IoT Security? | Article | 2020-01-15 | | article | hardware-security |
| Experts Meet on Imperatives of Hardware Security | Article | 2019-11-26 | | article | hardware-security puf |
| The Promise of Formal Methods to PUF Security Assurance | Article | 2019-11-13 | | article | hardware-security puf |
| PUF: A Crucial Technology for AI and IoT | Article | 2019-10-15 | | article | puf |
| “To be or not to be?” & “To be what?” those are two big questions for Libra! | Article | 2019-09-12 | | article | crypto-currency |
| The good, the bad and the ugly of hardware security | Article | 2019-09-11 | | article | hardware-security |