{"id":7449,"date":"2025-03-04T01:43:34","date_gmt":"2025-03-04T01:43:34","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?p=7449"},"modified":"2025-03-04T02:14:33","modified_gmt":"2025-03-04T02:14:33","slug":"ememory-and-pufsecurity-launch-worlds-first-puf-based-post-quantum-cryptography-solution-to-secure-the-future-of-computing","status":"publish","type":"post","link":"https:\/\/www.pufsecurity.com\/zh-hans\/ememory-and-pufsecurity-launch-worlds-first-puf-based-post-quantum-cryptography-solution-to-secure-the-future-of-computing\/","title":{"rendered":"eMemory and PUFsecurity Launch World\u2019s First PUF-Based Post-Quantum Cryptography Solution to Secure the Future of Computing"},"content":{"rendered":"\n

(Hsinchu, Taiwan, March 3rd<\/sup> ,2025) eMemory Technology Inc., a global leader in embedded non-volatile memory (eNVM) solutions, and its subsidiary PUFsecurity, a pioneer in Physical Unclonable Function (PUF)-based security IP, today announced the launch of the world\u2019s first PUF-based Post-Quantum Cryptography (PQC) solution. This groundbreaking innovation combines eMemory\u2019s cutting-edge NeoPUF technology with advanced PQC algorithms to deliver unparalleled security for the next generation of computing, safeguarding devices against the emerging threats posed by quantum computing.<\/p>\n\n\n\n

As quantum computing advances, traditional cryptographic systems, such as RSA and Elliptic Curve Cryptography (ECC), face increasing vulnerability to quantum attacks. In response, eMemory and PUFsecurity have developed a forward-looking solution that leverages the inherent randomness and uniqueness of PUF technology alongside PQC algorithms, including Kyber (ML-KEM) for key encapsulation and Dilithium (ML-DSA) for digital signatures. By using PUF-generated randomness as the seed for PQC within PUFsecurity\u2019s crypto coprocessor (PUFcc), which features a built-in hardware root of trust (PUFrt), this innovation ensures resilient protection against quantum threats while maintaining efficiency and scalability for modern applications, from cloud computing to IoT devices.<\/p>\n\n\n\n

This groundbreaking PUF-based PQC solution enables on-chip generation of quantum-resistant keys without relying on external key injection. By harnessing NeoPUF\u2019s quantum-tunneling mechanism, which exploits natural silicon variations to produce highly random and unclonable identifiers, this technology provides a secure foundation for key generation, storage, and authentication. This eliminates vulnerabilities associated with traditional key provisioning processes and offers a streamlined, cost-effective path to quantum-safe security.<\/p>\n\n\n\n

\u201cWe are thrilled to introduce the first PUF-based PQC solution, a milestone that positions eMemory and PUFsecurity at the forefront of securing future computing,\u201d said Charles Hsu, founder of eMemory and PUFsecurity. \u201cAs the threat of quantum computing looms, eMemory and PUFsecurity have joined forces to deliver a proactive, hardware-based approach that not only meets today\u2019s security needs but also prepares our partners and customers for tomorrow\u2019s challenges.\u201d<\/p>\n\n\n\n

The launch comes at a critical time, as governments and industries worldwide accelerate efforts to standardize PQC to counter \u201charvest now, decrypt later\u201d threats, where sensitive data encrypted today could be decrypted by quantum computers in the future. This PUF-based PQC solution addresses these concerns by embedding quantum-tunneling NeoPUF and next-generation quantum-resistant cryptography directly into the silicon, ensuring data protection across the device lifecycle.<\/p>\n\n\n\n

\u201cSecurity is the cornerstone of the connected world, and our new PUF-based PQC solution sets a new standard for trust and resilience,\u201d added Michael Ho, President of eMemory. \u201cBy combining our expertise in embedded memory with PUFsecurity\u2019s leadership in hardware security, we are empowering chip designers to build quantum-safe systems with confidence.\u201d<\/p>\n\n\n\n

Available now, this solution is designed for seamless integration across multiple foundry platforms, offering flexibility for applications in AI, automotive, cloud infrastructure, and beyond. eMemory and PUFsecurity invite industry partners to explore how this innovation can enhance their security strategies and prepare them for the quantum era.<\/p>\n\n\n\n

For more information, please contact us at sales@ememory.com.tw<\/a> or info@pufsecurity.com<\/a><\/p>\n\n\n\n

.<\/p>\n\n\n\n


\n\n\n\n

.<\/p>\n\n\n\n

\u529b\u65fa\u8207\u71b5\u78bc\u63a8\u51fa\u5168\u7403\u9996\u6b3e\u7d50\u5408PUF\u6280\u8853\u7684\u5f8c\u91cf\u5b50\u52a0\u5bc6\u65b9\u6848\uff0c\u78ba\u4fdd\u672a\u4f86\u8a08\u7b97\u5b89\u5168<\/strong><\/h3>\n\n\n\n

(\u53f0\u7063\u65b0\u7af9, 2025\u5e743\u67083\u65e5) \u5168\u7403\u5d4c\u5165\u5f0f\u975e\u63ee\u767c\u6027\u8a18\u61b6\u9ad4\uff08eNVM\uff09\u89e3\u6c7a\u65b9\u6848\u7684\u9818\u5c0e\u5ee0\u5546\u529b\u65fa\u96fb\u5b50\uff0c\u8207\u65d7\u4e0b\u5c08\u6ce8\u65bcPUF\uff08\u7269\u7406\u4e0d\u53ef\u8907\u88fd\u529f\u80fd\uff09\u5b89\u5168IP\u7684\u5b50\u516c\u53f8\u71b5\u78bc\u79d1\u6280\uff0c\u4eca\u65e5\u6b63\u5f0f\u63a8\u51fa\u5168\u7403\u9996\u6b3e\u7d50\u5408PUF\u6280\u8853\u7684\u5f8c\u91cf\u5b50\u52a0\u5bc6\uff08PQC\uff09\u89e3\u6c7a\u65b9\u6848\u3002\u6b64\u7a81\u7834\u6027\u5275\u65b0\u7d50\u5408\u4e86\u529b\u65fa\u9818\u5148\u696d\u754c\u7684NeoPUF\u6280\u8853\u8207\u5148\u9032\u7684PQC\u6f14\u7b97\u6cd5\uff0c\u70ba\u4e0b\u4e00\u4ee3\u8a08\u7b97\u8a2d\u5099\u63d0\u4f9b\u524d\u6240\u672a\u6709\u7684\u5b89\u5168\u6027\uff0c\u62b5\u79a6\u91cf\u5b50\u8a08\u7b97\u767c\u5c55\u5e36\u4f86\u7684\u65b0\u8208\u5a01\u8105\u3002<\/p>\n\n\n\n

\u96a8\u8457\u91cf\u5b50\u8a08\u7b97\u6280\u8853\u7684\u9032\u6b65\uff0c\u50b3\u7d71\u52a0\u5bc6\u7cfb\u7d71\uff08\u5982RSA\u8207\u6a62\u5713\u66f2\u7dda\u5bc6\u78bc\u5b78ECC\uff09\u6b63\u9762\u81e8\u65e5\u76ca\u589e\u9577\u7684\u91cf\u5b50\u653b\u64ca\u98a8\u96aa\u3002\u70ba\u6b64\uff0c\u529b\u65fa\u8207\u71b5\u78bc\u651c\u624b\u958b\u767c\u4e86\u4e00\u5957\u524d\u77bb\u6027\u7684\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\uff0c\u7d50\u5408PUF\u6280\u8853\u7684\u96a8\u6a5f\u6027\u8207\u7368\u7279\u6027\uff0c\u4e26\u652f\u63f4\u5f8c\u91cf\u5b50\u5bc6\u78bc\uff08PQC\uff09\u6f14\u7b97\u6cd5\uff0c\u5305\u62ec\u7528\u65bc\u91d1\u9470\u5c01\u88dd\u7684Kyber\uff08ML-KEM\uff09\u8207\u7528\u65bc\u6578\u4f4d\u7c3d\u7ae0\u7684Dilithium\uff08ML-DSA\uff09\u3002\u8a72\u65b9\u6848\u900f\u904e\u71b5\u78bc\u7684PUFcc\u52a0\u5bc6\u5354\u8655\u7406\u5668\u4e2d\u5167\u5efa\u7684PUFrt\u786c\u9ad4\u4fe1\u4efb\u6839\uff0c\u5229\u7528PUF\u6240\u7522\u751f\u7684\u96a8\u6a5f\u6578\u4f5c\u70baPQC\u6240\u9700\u7684\u6839\u5bc6\u9470\uff0c\u78ba\u4fdd\u5728\u61c9\u5c0d\u91cf\u5b50\u5a01\u8105\u7684\u540c\u6642\uff0c\u7dad\u6301\u73fe\u4ee3\u61c9\u7528\u5982\u96f2\u7aef\u904b\u7b97\u3001\u7269\u806f\u7db2\uff08IoT\uff09\u7b49\u9818\u57df\u6240\u9700\u7684\u9ad8\u6548\u80fd\u8207\u53ef\u64f4\u5c55\u6027\u3002<\/p>\n\n\n\n

\u9019\u9805\u7a81\u7834\u6027\u7684PUF\u6280\u8853\u8207PQC\u6574\u5408\u65b9\u6848\uff0c\u80fd\u5920\u5728\u6676\u7247\u5167\u76f4\u63a5\u7522\u751f\u6297\u91cf\u5b50\u91d1\u9470\uff0c\u7121\u9700\u4f9d\u8cf4\u5916\u90e8\u91d1\u9470\u6ce8\u5165\u3002\u5176\u6838\u5fc3\u6280\u8853NeoPUF\u63a1\u7528\u91cf\u5b50\u7a7f\u96a7\u6a5f\u5236\uff0c\u900f\u904e\u534a\u5c0e\u9ad4\u88fd\u7a0b\u4e2d\u7684\u5929\u7136\u96a8\u6a5f\u8b8a\u7570\uff0c\u751f\u6210\u9ad8\u5ea6\u96a8\u6a5f\u4e14\u7121\u6cd5\u8907\u88fd\u7684\u8b58\u5225\u78bc\uff0c\u70ba\u91d1\u9470\u751f\u6210\u3001\u5132\u5b58\u8207\u8a8d\u8b49\u63d0\u4f9b\u5b89\u5168\u57fa\u790e\u3002\u6b64\u6280\u8853\u6d88\u9664\u50b3\u7d71\u91d1\u9470\u914d\u7f6e\u904e\u7a0b\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\uff0c\u4ee5\u9ad8\u6548\u4e14\u5177\u6210\u672c\u6548\u76ca\u7684\u65b9\u5f0f\u5be6\u73fe\u91cf\u5b50\u5b89\u5168\u9632\u8b77\u3002<\/p>\n\n\n\n

\u300c\u6211\u5011\u5f88\u9ad8\u8208\u63a8\u51fa\u5168\u7403\u9996\u6b3e\u6574\u5408PUF\u6280\u8853\u7684PQC\u89e3\u6c7a\u65b9\u6848\uff0c\u9019\u662f\u529b\u65fa\u8207\u71b5\u78bc\u5728\u8a08\u7b97\u5b89\u5168\u9818\u57df\u7684\u91cd\u8981\u91cc\u7a0b\u7891\u3002\u300d\u529b\u65fa\u8207\u71b5\u78bc\u5275\u8fa6\u4eba\u5f90\u6e05\u7965\u8868\u793a\uff1a\u300c\u96a8\u8457\u91cf\u5b50\u8a08\u7b97\u5a01\u8105\u8feb\u5728\u7709\u776b\uff0c\u529b\u65fa\u8207\u71b5\u78bc\u651c\u624b\u63d0\u4f9b\u4e00\u7a2e\u7a4d\u6975\u4e14\u57fa\u65bc\u786c\u9ad4\u7684\u5b89\u5168\u9632\u8b77\uff0c\u4e0d\u50c5\u6eff\u8db3\u7576\u524d\u7684\u8cc7\u5b89\u9700\u6c42\uff0c\u66f4\u5354\u52a9\u6211\u5011\u7684\u5408\u4f5c\u5925\u4f34\u8207\u5ba2\u6236\u61c9\u5c0d\u672a\u4f86\u6311\u6230\u3002\u300d<\/p>\n\n\n\n

\u6b64\u6b21\u7522\u54c1\u767c\u8868\u6b63\u503c\u95dc\u9375\u6642\u523b\uff0c\u5168\u7403\u653f\u5e9c\u8207\u7522\u696d\u754c\u6b63\u52a0\u901f\u63a8\u52d5PQC\u6a19\u6e96\u5316\uff0c\u4ee5\u61c9\u5c0d\u300c\u5148\u7aca\u53d6\uff0c\u5f8c\u89e3\u5bc6\u300d\u7684\u6f5b\u5728\u98a8\u96aa\uff0c\u5373\u4eca\u65e5\u52a0\u5bc6\u7684\u654f\u611f\u6578\u64da\u53ef\u80fd\u5728\u672a\u4f86\u88ab\u91cf\u5b50\u96fb\u8166\u7834\u89e3\u3002\u672c\u6b21\u63a8\u51fa\u7684PUF\u6280\u8853PQC\u89e3\u6c7a\u65b9\u6848\uff0c\u76f4\u63a5\u5c07\u91cf\u5b50\u7a7f\u96a7\u7684NeoPUF\u8207\u65b0\u4e00\u4ee3\u6297\u91cf\u5b50\u8a08\u7b97\u653b\u64ca\u7684\u5f8c\u91cf\u5b50\u52a0\u5bc6\u6280\u8853\u5d4c\u5165\u6676\u7247\u5167\uff0c\u78ba\u4fdd\u8a2d\u5099\u751f\u547d\u9031\u671f\u4e2d\u7684\u6578\u64da\u5b89\u5168\u3002<\/p>\n\n\n\n

\u300c\u5b89\u5168\u662f\u9023\u7db2\u4e16\u754c\u7684\u57fa\u77f3\uff0c\u800c\u6211\u5011\u7684PUF\u6280\u8853PQC\u89e3\u6c7a\u65b9\u6848\u6a39\u7acb\u4e86\u65b0\u7684\u4fe1\u4efb\u8207\u97cc\u6027\u5178\u7bc4\u3002\u300d\u529b\u65fa\u7e3d\u7d93\u7406\u4f55\u660e\u6d32\u88dc\u5145\u9053\uff1a\u300c\u900f\u904e\u7d50\u5408\u529b\u65fa\u5728\u5d4c\u5165\u5f0f\u8a18\u61b6\u9ad4\u9818\u57df\u7684\u5c08\u696d\uff0c\u4ee5\u53ca\u71b5\u78bc\u5728\u786c\u9ad4\u5b89\u5168\u65b9\u9762\u7684\u6280\u8853\u9818\u5c0e\u529b\uff0c\u6211\u5011\u5e6b\u52a9\u6676\u7247\u8a2d\u8a08\u8005\u8f15\u9b06\u6253\u9020\u91cf\u5b50\u5b89\u5168\u7cfb\u7d71\uff0c\u78ba\u4fdd\u672a\u4f86\u7684\u5b89\u5168\u6027\u3002\u300d<\/p>\n\n\n\n

\u76ee\u524d\uff0c\u8a72\u89e3\u6c7a\u65b9\u6848\u5df2\u5168\u9762\u4e0a\u5e02\uff0c\u53ef\u7121\u7e2b\u6574\u5408\u81f3\u591a\u5bb6\u6676\u5713\u4ee3\u5de5\u5ee0\u7684\u88fd\u7a0b\u5e73\u53f0\uff0c\u70baAI\u3001\u6c7d\u8eca\u96fb\u5b50\u3001\u96f2\u7aef\u57fa\u790e\u8a2d\u65bd\u7b49\u61c9\u7528\u63d0\u4f9b\u9ad8\u5ea6\u9748\u6d3b\u6027\u3002\u529b\u65fa\u8207\u71b5\u78bc\u8aa0\u9080\u696d\u754c\u5925\u4f34\u5171\u540c\u63a2\u7d22\u6b64\u5275\u65b0\u6280\u8853\uff0c\u5f37\u5316\u8cc7\u5b89\u7b56\u7565\uff0c\u8fce\u63a5\u91cf\u5b50\u6642\u4ee3\u3002<\/p>\n\n\n\n

\u66f4\u591a\u8cc7\u8a0a\uff0c\u8acb\u806f\u7d61\u6211\u5011\uff1a
sales@ememory.com.tw \u6216 info@pufsecurity.com<\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

eMemory and PUFsecurity launched the world\u2019s first PUF-based Post-Quantum Cryptography (PQC) solution, integrating NeoPUF technology with advanced PQC algorithms to safeguard devices against quantum threats.<\/p>\n","protected":false},"author":17,"featured_media":7450,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[22,295,27],"class_list":["post-7449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","tag-ememory","tag-pqc","tag-pufsecurity"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7449"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=7449"}],"version-history":[{"count":8,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7449\/revisions"}],"predecessor-version":[{"id":7464,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7449\/revisions\/7464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media\/7450"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=7449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=7449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=7449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}