{"id":3244,"date":"2021-12-14T02:34:58","date_gmt":"2021-12-14T02:34:58","guid":{"rendered":"https:\/\/www.pufsecurity.com\/resources\/"},"modified":"2022-06-30T05:08:48","modified_gmt":"2022-06-30T05:08:48","slug":"resources","status":"publish","type":"page","link":"https:\/\/www.pufsecurity.com\/zh-hans\/resources\/","title":{"rendered":"\u8d44\u6e90\u5206\u4eab"},"content":{"rendered":"
| <\/th> | Topic<\/th> | Types<\/th> | Date<\/th> | Link<\/th> | doc_categories_hfilter<\/th> | doc_tags_hfilter<\/th><\/tr><\/thead> | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| <\/td> | The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified\u2122 Level 3 RoT Component Certification<\/td> | Article<\/a><\/td> | 2024-11-26<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | otp root-of-trust sram-repair<\/td><\/tr> | <\/td> | Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security<\/td> | Book<\/a><\/td> | 2024-09-20<\/td> | Learn More<\/span><\/a><\/div><\/td> book<\/td> | anti-tampering puf pufrt<\/td><\/tr> | <\/td> | Hardware Security Book Series 2: PUF-based Solutions and Applications<\/td> | Book<\/a><\/td> | 2024-09-13<\/td> | Learn More<\/span><\/a><\/div><\/td> book<\/td> | puf pufrt<\/td><\/tr> | <\/td> | Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair<\/td> | Article<\/a><\/td> | 2024-07-31<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | otp root-of-trust sram-repair<\/td><\/tr> | <\/td> | Hardware Security Book Series 1: Quantum Tunneling PUF<\/td> | Book<\/a><\/td> | 2024-04-30<\/td> | Learn More<\/span><\/a><\/div><\/td> book<\/td> | puf<\/td><\/tr> | <\/td> | Embracing a More Secure Era with TLS 1.3<\/td> | Article<\/a><\/td> | 2024-04-01<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | iot pufcc7 root-of-trust security tls<\/td><\/tr> | <\/td> | Post-Quantum Cryptography (PQC) \u2013 On the Road to Preparedness<\/td> | Article<\/a><\/td> | 2023-12-22<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | cryptogaphy postquantumcryptography pqc root-of-trust<\/td><\/tr> | <\/td> | The Challenge of Automotive Hardware Security Deployment<\/td> | Article<\/a><\/td> | 2023-09-27<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | Securing System-on-Chips: Hardware Protection in the Age of Chiplets<\/td> | Article<\/a><\/td> | 2023-05-01<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | chiplet hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor<\/td> | White Paper<\/a><\/td> | 2023-03-21<\/td> | Learn More<\/span><\/a><\/div><\/td> white-paper<\/td> | arm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2<\/td><\/tr> | <\/td> | Set-Top Boxes are a growing Cybersecurity Threat<\/td> | Article<\/a><\/td> | 2022-11-23<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | secure-otp stb<\/td><\/tr> | <\/td> | Securing the AIoT: Safeguarding AI at the Edge<\/td> | Article<\/a><\/td> | 2022-08-11<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security pufcc<\/td><\/tr> | <\/td> | Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory<\/td> | Webinar<\/a><\/td> | 2022-07-19<\/td> | Watch Now<\/span><\/a><\/div><\/td> webinar<\/td> | flash-protection hardware-security root-of-trust<\/td><\/tr> | <\/td> | Why Hardware Root of Trust\u00a0 Needs Anti-Tampering Design<\/td> | White Paper<\/a><\/td> | 2022-04-18<\/td> | Learn More<\/span><\/a><\/div><\/td> white-paper<\/td> | anti-tampering puf pufrt<\/td><\/tr> | <\/td> | Software-Defined Everything doesn\u2019t mean Software-Only Security<\/td> | Article<\/a><\/td> | 2022-04-06<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security<\/td><\/tr> | <\/td> | TPM 2.0-Ready: Top Security with PUFcc<\/td> | Article<\/a><\/td> | 2022-03-22<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security pufcc<\/td><\/tr> | <\/td> | PUFrt: Solving Chip Security\u2019s Weakest Link<\/td> | White Paper<\/a><\/td> | 2021-12-20<\/td> | Learn More<\/span><\/a><\/div><\/td> white-paper<\/td> | hardware-security puf pufrt root-of-trust<\/td><\/tr> | <\/td> | Securing the IC Supply Chain – Integrating PUF-Based hardware security<\/td> | Article<\/a><\/td> | 2021-10-06<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust supply-chain<\/td><\/tr> | <\/td> | Adopting PUF to Implement Zero Trust Architecture<\/td> | Article<\/a><\/td> | 2021-09-30<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust zero-trust<\/td><\/tr> | <\/td> | PUFcc: An Essential Crypto Coprocessor for RISC-V<\/td> | White Paper<\/a><\/td> | 2021-09-16<\/td> | Learn More<\/span><\/a><\/div><\/td> white-paper<\/td> | crypto-coprocessor hardware-security pufcc risc-v-architechure<\/td><\/tr> | <\/td> | How PUF-based RoT Can Solve IoT Security Issues<\/td> | Article<\/a><\/td> | 2021-09-10<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security root-of-trust<\/td><\/tr> | <\/td> | Webinar: The Secure Coprocessor for Secure Supply Chain<\/td> | Webinar<\/a><\/td> | 2021-06-11<\/td> | Watch Now<\/span><\/a><\/div><\/td> webinar<\/td> | crypto-coprocessor hardware-security pufcc root-of-trust<\/td><\/tr> | <\/td> | Webinar: PUFcc, The PUF-based Crypto Coprocessor<\/td> | Webinar<\/a><\/td> | 2021-06-10<\/td> | Watch Now<\/span><\/a><\/div><\/td> webinar<\/td> | crypto-coprocessor hardware-security pufcc root-of-trust<\/td><\/tr> | <\/td> | Talk: Chip Fingerprints Realize Safer Chip Applications and Services<\/td> | Video<\/a><\/td> | 2021-06-08<\/td> | Watch Now<\/span><\/a><\/div><\/td> video<\/td> | crypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust<\/td><\/tr> | <\/td> | Vital Ways to Prevent a Cyberattack<\/td> | Article<\/a><\/td> | 2021-05-05<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security<\/td><\/tr> | <\/td> | Security Innovations That Are Helping Businesses in 2021<\/td> | Article<\/a><\/td> | 2021-03-17<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | Standardized PUF-based Solution for Device eID<\/td> | Article<\/a><\/td> | 2021-03-02<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | crypto-coprocessor hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | PUF is a Hardware Solution for the Sunburst Hack<\/td> | Article<\/a><\/td> | 2021-01-28<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf<\/td><\/tr> | <\/td> | 2020 Security on Chip Tech Forum Highlights<\/td> | Article<\/a><\/td> | 2020-12-28<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security<\/td><\/tr> | <\/td> | \u5b89\u5168\u52a0\u5bc6\u5354\u5904\u7406\u5668: PUFcc<\/td> | Article<\/a><\/td> | 2020-12-16<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | crypto-coprocessor hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | \u91cf\u5b50\u7a7f\u96a7PUF\u4fe1\u4efb\u6839: PUFrt<\/td> | Article<\/a><\/td> | 2020-12-11<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | PUF Series 6: The Four Angles of Examining PUF<\/td> | Article<\/a><\/td> | 2020-09-15<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application<\/td> | Article<\/a><\/td> | 2020-09-14<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust<\/td> | Article<\/a><\/td> | 2020-06-22<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF<\/td> | Article<\/a><\/td> | 2020-06-16<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF<\/td> | Article<\/a><\/td> | 2020-06-15<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | PUF Series 1: SRAM PUF is Increasingly Vulnerable<\/td> | Article<\/a><\/td> | 2020-06-14<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | RoT: The Foundation of Security<\/td> | Article<\/a><\/td> | 2020-05-14<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf root-of-trust<\/td><\/tr> | <\/td> | Build Trust in Silicon: A Myth or a Reality?<\/td> | Article<\/a><\/td> | 2020-04-23<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security root-of-trust<\/td><\/tr> | <\/td> | Is Blockchain the Silver Bullet of IoT Security?<\/td> | Article<\/a><\/td> | 2020-01-15<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security<\/td><\/tr> | <\/td> | Experts Meet on Imperatives of Hardware Security<\/td> | Article<\/a><\/td> | 2019-11-26<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf<\/td><\/tr> | <\/td> | The Promise of Formal Methods to PUF Security Assurance<\/td> | Article<\/a><\/td> | 2019-11-13<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security puf<\/td><\/tr> | <\/td> | PUF: A Crucial Technology for AI and IoT<\/td> | Article<\/a><\/td> | 2019-10-15<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | puf<\/td><\/tr> | <\/td> | \u201cTo be or not to be?\u201d & \u201cTo be what?\u201d those are two big questions for Libra!<\/td> | Article<\/a><\/td> | 2019-09-12<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | crypto-currency<\/td><\/tr> | <\/td> | The good, the bad and the ugly of hardware security<\/td> | Article<\/a><\/td> | 2019-09-11<\/td> | Learn More<\/span><\/a><\/div><\/td> article<\/td> | hardware-security<\/td><\/tr><\/tbody><\/table>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-resource-list.php","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-3244","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/pages\/3244"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=3244"}],"version-history":[{"count":5,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/pages\/3244\/revisions"}],"predecessor-version":[{"id":3904,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/pages\/3244\/revisions\/3904"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=3244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}} | |