{"id":7725,"date":"2026-01-16T05:31:47","date_gmt":"2026-01-16T05:31:47","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?p=7725"},"modified":"2026-01-16T08:29:29","modified_gmt":"2026-01-16T08:29:29","slug":"ememory-and-pufsecuritys-pufpqc-achieves-nist-fips-205-and-sp-800-208-certification-reaching-a-milestone-in-comprehensive-post-quantum-cryptography-protection","status":"publish","type":"post","link":"https:\/\/www.pufsecurity.com\/zh-hans\/ememory-and-pufsecuritys-pufpqc-achieves-nist-fips-205-and-sp-800-208-certification-reaching-a-milestone-in-comprehensive-post-quantum-cryptography-protection\/","title":{"rendered":"eMemory and PUFsecurity\u2019s PUF-PQC Achieves NIST FIPS 205 and SP 800-208 Certification, Reaching a Milestone in Comprehensive Post-Quantum Cryptography Protection"},"content":{"rendered":"\n
Hardware Root of Trust Drives the PQC Transition, Building a Zero-Trust Security Foundation for AI and Edge Computing<\/em><\/strong><\/p>\n\n\n\n <\/p>\n\n\n\n Hsinchu, Taiwan \u2013 January 16th, 2026<\/strong> \u2014 eMemory Technology Inc.<\/strong>, a global leader in embedded non-volatile memory, together with its subsidiary PUFsecurity Corp.<\/strong>, a specialist in hardware security silicon IP, today jointly announced a major technological breakthrough. Their collaboratively developed PUF-PQC Post-Quantum Cryptography (PQC) hardware-accelerated solution<\/strong> has officially passed the latest standards certification issued by the National Institute of Standards and Technology (NIST)<\/strong>.<\/p>\n\n\n\n Following the earlier achievement of FIPS 203 (ML-KEM\/Kyber) and FIPS 204 (ML-DSA\/Dilithium) certifications, PUF-PQC has now further obtained certification for FIPS 205 (SLH-DSA\/SPHINCS+)<\/strong>, which specifies stateless hash-based digital signatures<\/strong>, as well as SP 800-208<\/strong>, which defines stateful hash-based signature schemes (LMS\/XMSS)<\/strong>. This milestone signifies that eMemory and PUFsecurity now comprehensively cover all key PQC standards currently released by NIST.<\/p>\n\n\n\n Building on this foundation, in addition to having already been integrated into the chip designs of leading server management controller (BMC SoC) vendors<\/strong> to support NIST-compliant post-quantum cryptographic security requirements, PUF-PQC<\/strong> has now completed the final piece of the post-quantum security protection framework, further strengthening the company\u2019s leadership position in the global semiconductor security landscape.<\/p>\n\n\n\n Addressing the Quantum Threat and Accelerating Security Architecture Transformation<\/strong><\/p>\n\n\n\n As quantum computing technologies continue to advance at an exponential pace, the public-key cryptographic systems underpinning today\u2019s global digital economy \u2013 RSA (Rivest\u2013Shamir\u2013Adleman)<\/strong> and ECC (Elliptic Curve Cryptography)<\/strong> \u2013 are increasingly exposed to the risk of future compromise. In 2024, NIST formally released a new series of PQC standards, representing not only a significant technological evolution in cryptography, but also a clear signal for structural transformation across the global semiconductor industry.<\/p>\n\n\n\n In particular, the LMS and XMSS algorithms<\/strong> specified in SP 800-208<\/strong>, recognized for their high security assurance and maturity, are widely regarded as critical technologies for secure firmware updates in long-lifecycle devices such as industrial control systems, automotive electronics, and server baseboard management controllers (BMCs). Meanwhile, FIPS 205<\/strong> provides stateless hash-based signatures, offering a flexible and complementary option for a wide range of application scenarios.<\/p>\n\n\n\n The founder of eMemory and PUFsecurity, Charles Hsu, stated:<\/p>\n\n\n\n \u201cAchieving full NIST certification across FIPS 203, 204, 205, and SP 800-208 represents a major milestone for eMemory and PUFsecurity in the field of hardware security. Under the growing shadow of \u2018harvest-now, decrypt-later\u2019 threats, compliance has become an urgent industry imperative. Our comprehensive certification portfolio not only addresses today\u2019s security compliance requirements, but also enables our partners to establish robust and future-proof defenses well ahead of the commercialization of quantum computers.\u201d<\/p>\n\n\n\n Hardware Root of Trust: The Cornerstone of PQC Security<\/strong><\/p>\n\n\n\n While PQC algorithms provide mathematical resistance against quantum attacks, their real-world security ultimately depends on the quality of key generation and storage. Without sufficient randomness at the source or robust protection of stored keys, even the strongest algorithms can be rendered ineffective. eMemory and PUFsecurity emphasize that the core strength of PUF-PQC<\/strong> lies in its deep integration with PUFrt (Root of Trust)<\/strong>, addressing the most critical challenges in PQC implementation at the physical level:<\/p>\n\n\n\n Building a Sustainable Quantum-Secure Ecosystem for the Future<\/strong><\/p>\n\n\n\n The newly certified FIPS 205<\/strong> and SP 800-208<\/strong> standards are particularly well suited for mission-critical infrastructure that demands the highest security assurance and long-term maintainability. LMS-based signatures, built entirely on hash functions, are widely regarded as among the most robust digital signature schemes against quantum attacks, making them ideal for verifying firmware authenticity and preventing malicious code injection.<\/p>\n\n\n\n Michael Ho, President of eMemory Technology, added:<\/p>\n\n\n\n \u201cOur solution is not merely a collection of certified IP blocks \u2013 it represents a scalable and sustainable trust architecture for the post-quantum era. By combining eMemory\u2019s long-standing technical and production expertise in embedded memory with PUFsecurity\u2019s specialization in hardware security design, we significantly lower the barrier to PQC adoption. Chip designers can integrate these NIST-validated modules into their designs without needing deep expertise in complex cryptographic parameters.\u201d<\/p>\n\n\n\n The fully NIST-certified PUF-PQC solution<\/strong> is now commercially available and can be seamlessly integrated across both advanced and mature process platforms at multiple foundries. From cost-sensitive IoT endpoint devices to high-performance computing (HPC) and AI accelerators, PUF-PQC enables customers to build robust security architectures while complying with stringent international security frameworks such as CNSA 2.0 (the post-quantum cryptography migration framework), confidently guiding the industry into the post-quantum era.<\/p>\n\n\n\n About PUFsecurity<\/strong><\/p>\n\n\n\n PUFsecurity is a global leading provider of Hardware Root of Trust<\/strong> technologies, specializing in security IP solutions built around PUF (Physical Unclonable Function)<\/strong> technology. Leveraging its parent company eMemory\u2019s NeoPUF native key generation and OTP secure storage foundations, PUFsecurity focuses on the development and deployment of NeoPUF-based, full-stack hardware security architectures. The company is dedicated to helping global chip and system designers address the security challenges of the quantum era and build long-term, resilient security foundations.<\/p>\n\n\n\n PUFsecurity\u2019s core product portfolio includes PUF-PQC (Post-Quantum Cryptography)<\/strong>, PUFcc (Crypto Coprocessor)<\/strong>, PUFrt (Root of Trust)<\/strong>, and PUFhsm (Hardware Security Module)<\/strong> IP solutions. The company is further advancing a PUF-based Security-as-a-Service ecosystem<\/strong>, delivering trusted identity, protection, and authentication mechanisms for next-generation connected devices.<\/p>\n\n\n\n \u4ee5\u786c\u9ad4\u4fe1\u4efb\u6839\u9a45\u52d5 PQC \u9769\u547d\uff0c\u70ba AI \u8207\u908a\u7de3\u904b\u7b97\u5efa\u69cb\u96f6\u4fe1\u4efb\u5b89\u5168\u57fa\u77f3<\/em><\/p>\n\n\n\n \u3010\u53f0\u7063\u65b0\u7af9 \u2013 2026\u5e741\u670816\u65e5\u3011<\/strong> \u5168\u7403\u5d4c\u5165\u5f0f\u975e\u63ee\u767c\u6027\u8a18\u61b6\u9ad4\u9818\u5c0e\u5ee0\u5546\u529b\u65fa\u96fb\u5b50\uff08eMemory Technology Inc.\uff09\u8207\u65d7\u4e0b\u5c08\u6ce8\u65bc\u786c\u9ad4\u5b89\u5168\u77fd\u667a\u8ca1\u7684\u5b50\u516c\u53f8\u71b5\u78bc\u79d1\u6280\uff08PUFsecurity Corp.\uff09\uff0c\u4eca\u65e5\u5171\u540c\u5ba3\u5e03\u4e00\u9805\u91cd\u5927\u6280\u8853\u7a81\u7834\uff1a\u5176\u5408\u4f5c\u958b\u767c\u7684 PUF-PQC<\/strong> \u5f8c\u91cf\u5b50\u5bc6\u78bc\u5b78\uff08Post-Quantum Cryptography, PQC\uff09\u786c\u9ad4\u52a0\u901f\u89e3\u6c7a\u65b9\u6848\uff0c\u5df2\u6b63\u5f0f\u901a\u904e\u7f8e\u570b\u570b\u5bb6\u6a19\u6e96\u66a8\u6280\u8853\u7814\u7a76\u9662\uff08NIST\uff09\u7684\u6700\u65b0\u6a19\u6e96\u8a8d\u8b49\u3002<\/p>\n\n\n\n \u7e7c\u5148\u524d\u53d6\u5f97 FIPS 203\uff08ML-KEM\/Kyber\uff09\u8207 FIPS 204\uff08ML-DSA\/Dilithium\uff09\u8b49\u66f8\u5f8c\uff0cPUF-PQC \u8fd1\u671f\u9032\u4e00\u6b65\u901a\u904e\u4e86 FIPS 205\uff08SLH-DSA\/SPHINCS+\uff09<\/strong>\u70ba\u7121\u72c0\u614b\u7684\u96dc\u6e4a\u7c3d\u7ae0 (Stateless Hash-Based Digital Signatures)\u4ee5\u53ca\u91dd\u5c0d\u6709\u72c0\u614b\u96dc\u6e4a\u7c3d\u7ae0\uff08Stateful Hash-Based Signatures\uff09\u7684 SP 800-208\uff08LMS\/XMSS\uff09<\/strong> \u8a8d\u8b49\uff1b\u9019\u4e5f\u4ee3\u8868\u529b\u65fa\u8207\u71b5\u78bc\u5df2\u5b8c\u6574\u8986\u84cb NIST \u7576\u524d\u767c\u5e03\u7684\u6240\u6709\u95dc\u9375 PQC \u6a19\u6e96\u3002<\/p>\n\n\n\n \u5728\u6b64\u57fa\u790e\u4e0a\uff0c\u9664\u4e86\u5148\u524d\u5df2\u7531\u9818\u5148\u7d1a\u4f3a\u670d\u5668\u7ba1\u7406\u63a7\u5236\u6676\u7247\uff08BMC SoC\uff09\u4f9b\u61c9\u5546\u5c0e\u5165\u5176\u6676\u7247\u8a2d\u8a08<\/strong>\uff0c\u4ee5\u652f\u63f4\u7b26\u5408 NIST \u6a19\u6e96\u7684\u5f8c\u91cf\u5b50\u5bc6\u78bc\u5b89\u5168\u9700\u6c42\u5916\uff0cPUF-PQC<\/strong> \u4ea6\u6210\u529f\u5b8c\u6210\u5f8c\u91cf\u5b50\u5b89\u5168\u9632\u8b77\u7db2\u7684\u6700\u5f8c\u4e00\u584a\u62fc\u5716\uff0c\u9032\u4e00\u6b65\u978f\u56fa\u516c\u53f8\u5728\u5168\u7403\u534a\u5c0e\u9ad4\u8cc7\u5b89\u9818\u57df\u7684\u9818\u5148\u5730\u4f4d\u3002<\/p>\n\n\n\n \u61c9\u5c0d\u91cf\u5b50\u5a01\u8105\uff0c\u555f\u52d5\u8cc7\u5b89\u67b6\u69cb\u8f49\u578b<\/strong><\/strong><\/p>\n\n\n\n \u96a8\u8457\u91cf\u5b50\u904b\u7b97\u6280\u8853\u7684\u6307\u6578\u7d1a\u6210\u9577\uff0c\u7576\u524d\u5168\u7403\u6578\u4f4d\u7d93\u6fdf\u8cf4\u4ee5\u751f\u5b58\u7684 RSA \uff08Rivest-Shamir-Adleman\uff09\u8207 ECC\uff08Elliptic Curve Cryptography\uff0c\u6a62\u5713\u66f2\u7dda\u5bc6\u78bc\u5b78\uff09\u516c\u9470\u52a0\u5bc6\u9ad4\u7cfb\uff0c\u6b63\u9762\u81e8\u88ab\u7834\u89e3\u7684\u5371\u6a5f\u3002NIST \u65bc 2024 \u5e74\u6b63\u5f0f\u767c\u5e03\u4e00\u7cfb\u5217 PQC \u6a19\u6e96\uff0c\u4e0d\u50c5\u662f\u5bc6\u78bc\u5b78\u754c\u7684\u6280\u8853\u8fed\u4ee3\uff0c\u66f4\u662f\u5411\u5168\u7403\u534a\u5c0e\u9ad4\u7522\u696d\u767c\u51fa\u7684\u8f49\u578b\u8a0a\u865f\u3002<\/p>\n\n\n\n \u7279\u5225\u662f SP 800-208<\/strong> \u6a19\u6e96\u4e2d\u6240\u898f\u7bc4\u7684 LMS \u8207 XMSS \u7b97\u6cd5\uff0c\u56e0\u5177\u5099\u6975\u9ad8\u7684\u5b89\u5168\u6027\u8207\u6210\u719f\u5ea6\uff0c\u88ab\u8996\u70ba\u4fdd\u8b77\u9577\u751f\u547d\u9031\u671f\u8a2d\u5099\uff0c\u5982\u5de5\u63a7\u7cfb\u7d71\u3001\u8eca\u7528\u96fb\u5b50\u3001\u4f3a\u670d\u5668 BMC\u7b49\uff0c\u9032\u884c\u5b89\u5168\u97cc\u9ad4\u66f4\u65b0\u7684\u95dc\u9375\u6280\u8853\uff1b\u800c FIPS 205<\/strong> \u5247\u63d0\u4f9b\u4e86\u7121\u72c0\u614b\u7684\u96dc\u6e4a\u7c3d\u7ae0\uff0c\u70ba\u61c9\u7528\u4e0d\u540c\u5834\u666f\u63d0\u4f9b\u4e86\u9748\u6d3b\u7684\u5099\u63f4\u9078\u64c7\u3002<\/p>\n\n\n\n \u529b\u65fa\u96fb\u5b50\u8207\u71b5\u78bc\u79d1\u6280\u5275\u8fa6\u4eba\u5f90\u6e05\u7965\u535a\u58eb\u8868\u793a\uff1a\u300c\u5b8c\u6574\u53d6\u5f97 NIST FIPS 203\u3001204\u3001205 \u4ee5\u53ca SP 800-208 \u7684\u8a8d\u8b49\uff0c\u662f\u529b\u65fa\u8207\u71b5\u78bc\u5728\u786c\u9ad4\u5b89\u5168\u9818\u57df\u7684\u91cd\u5927\u91cc\u7a0b\u7891\u3002\u5728\u300e\u5148\u7aca\u53d6\uff0c\u5f8c\u89e3\u5bc6\u300f\u7684\u5a01\u8105\u9670\u5f71\u4e0b\uff0c\u696d\u754c\u5c0d\u65bc\u5408\u898f\u7684\u9700\u6c42\u5df2\u523b\u4e0d\u5bb9\u7de9\u3002\u6211\u5011\u7684\u5168\u65b9\u4f4d\u8a8d\u8b49\u4e0d\u50c5\u6eff\u8db3\u4e86\u5ba2\u6236\u7576\u524d\u7684\u8cc7\u5b89\u5408\u898f\u9700\u6c42\uff0c\u66f4\u5354\u52a9\u5408\u4f5c\u5925\u4f34\u5728\u91cf\u5b50\u96fb\u8166\u6b63\u5f0f\u5546\u7528\u5316\u4e4b\u524d\uff0c\u63d0\u524d\u69cb\u7bc9\u8d77\u5805\u4e0d\u53ef\u6467\u7684\u9632\u79a6\u5de5\u4e8b\u3002\u300d<\/p>\n\n\n\n \u7269\u7406\u7d1a\u4fe1\u4efb\u6839\u6e90\uff1a<\/strong>PQC <\/strong>\u7684\u5b89\u5168\u5b9a\u6d77\u795e\u91dd<\/strong><\/strong><\/p>\n\n\n\n \u5118\u7ba1 PQC \u6f14\u7b97\u6cd5\u5728\u6578\u5b78\u908f\u8f2f\u4e0a\u4fdd\u8b49\u4e86\u6297\u91cf\u5b50\u653b\u64ca\u7684\u80fd\u529b\uff0c\u4f46\u82e5\u91d1\u9470\u751f\u6210\u7684\u300c\u6e90\u982d\u300d\u7f3a\u4e4f\u96a8\u6a5f\u6027\uff0c\u6216\u91d1\u9470\u5132\u5b58\u65b9\u5f0f\u5b58\u5728\u6f0f\u6d1e\uff0c\u518d\u5f37\u5927\u7684\u6f14\u7b97\u6cd5\u4e5f\u5c07\u5f62\u540c\u865b\u8a2d\u3002\u529b\u65fa\u8207\u71b5\u78bc\u5f37\u8abf\uff0cPUF-PQC \u7684\u6838\u5fc3\u512a\u52e2\u5728\u65bc\u6df1\u5ea6\u6574\u5408\u4e86 PUFrt \uff08Hardware Root of Trust\uff09\u786c\u9ad4\u4fe1\u4efb\u6839<\/strong>\uff0c\u5f9e\u7269\u7406\u5c64\u9762\u89e3\u6c7a\u4e86 PQC \u5be6\u4f5c\u4e2d\u6700\u68d8\u624b\u7684\u96e3\u984c\uff1a<\/p>\n\n\n\n \u5c55\u671b\u672a\u4f86\uff1a\u69cb\u5efa\u53ef\u6301\u7e8c\u7684\u91cf\u5b50\u5b89\u5168\u751f\u614b<\/strong><\/strong><\/p>\n\n\n\n \u672c\u6b21\u901a\u904e\u8a8d\u8b49\u7684 FIPS 205 \u8207 SP 800-208\uff0c\u7279\u5225\u9069\u7528\u65bc\u5c0d\u5b89\u5168\u8981\u6c42\u6975\u9ad8\u4e14\u9700\u8981\u9577\u671f\u7dad\u8b77\u7684\u57fa\u790e\u8a2d\u65bd\u3002\u4f8b\u5982\uff0cLMS \u7b97\u6cd5\u56e0\u5176\u57fa\u65bc\u96dc\u6e4a\u51fd\u6578\u7684\u7279\u6027\uff0c\u88ab\u5ee3\u6cdb\u8a8d\u70ba\u662f\u76ee\u524d\u5c0d\u6297\u91cf\u5b50\u653b\u64ca\u6700\u7a69\u5065\u7684\u6578\u4f4d\u7c3d\u7ae0\u65b9\u6848\u4e4b\u4e00\uff0c\u6975\u9069\u5408\u7528\u65bc\u9a57\u8b49\u97cc\u9ad4\u66f4\u65b0\u7684\u5408\u6cd5\u6027\uff0c\u9632\u6b62\u60e1\u610f\u7a0b\u5f0f\u78bc\u690d\u5165\u3002<\/p>\n\n\n\n \u529b\u65fa\u96fb\u5b50\u7e3d\u7d93\u7406\u4f55\u660e\u6d32\u88dc\u5145\u9053\uff1a\u300c\u6211\u5011\u7684\u89e3\u6c7a\u65b9\u6848\u4e0d\u50c5\u50c5\u662f\u4e00\u7d44\u901a\u904e\u8a8d\u8b49\u7684 IP\uff0c\u66f4\u662f\u5f8c\u91cf\u5b50\u6642\u4ee3\u53ef\u6301\u7e8c\u3001\u53ef\u64f4\u5c55\u4fe1\u4efb\u67b6\u69cb\u7684\u85cd\u5716\u3002\u900f\u904e\u7d50\u5408\u529b\u65fa\u5728\u5d4c\u5165\u5f0f\u8a18\u61b6\u9ad4\u9818\u57df\u7684\u6df1\u539a\u7d2f\u7e3e\u7684\u6280\u8853\u8207\u91cf\u7522\u7d93\u9a57\u8207\u71b5\u78bc\u5728\u786c\u9ad4\u5b89\u5168\u8a2d\u8a08\u7684\u5c08\u696d\uff0c\u6211\u5011\u5927\u5e45\u964d\u4f4e\u4e86 PQC \u7684\u5c0e\u5165\u9580\u6abb\u3002\u6676\u7247\u8a2d\u8a08\u8005\u7121\u9700\u6df1\u5165\u947d\u7814\u8907\u96dc\u7684\u5bc6\u78bc\u5b78\u53c3\u6578\uff0c\u5373\u53ef\u8f15\u9b06\u5c07\u9019\u5957\u7d93 NIST \u9a57\u8b49\u7684\u6a21\u7d44\u6574\u5408\u81f3\u8a2d\u8a08\u4e2d\u3002\u300d<\/p>\n\n\n\n \u76ee\u524d\uff0c\u9019\u5957\u7372\u5f97 NIST \u5168\u7cfb\u5217\u8a8d\u8b49\u7684 PUF-PQC \u89e3\u6c7a\u65b9\u6848\u5df2\u5168\u9762\u4e0a\u5e02\uff0c\u4e26\u53ef\u7121\u7e2b\u6574\u5408\u81f3\u591a\u5bb6\u6676\u5713\u4ee3\u5de5\u5ee0\u7684\u5148\u9032\u88fd\u7a0b\u8207\u6210\u719f\u88fd\u7a0b\u5e73\u53f0\u3002\u7121\u8ad6\u662f\u8ffd\u6c42\u6210\u672c\u6548\u76ca\u7684\u7269\u806f\u7db2\u7aef\u9ede\u8a2d\u5099\uff0c\u9084\u662f\u8ffd\u6c42\u6975\u81f4\u6548\u80fd\u7684\u9ad8\u901f\u904b\u7b97\uff08HPC\uff09\u8207 AI \u6676\u7247\uff0cPUF-PQC \u90fd\u80fd\u5354\u52a9\u5ba2\u6236\u5728\u7b26\u5408 CNSA 2.0\uff08\u5f8c\u91cf\u5b50\u5bc6\u78bc\u9077\u79fb\u6846\u67b6\uff09\u7b49\u570b\u969b\u9ad8\u898f\u683c\u8cc7\u5b89\u6a19\u6e96\u7684\u524d\u63d0\u4e0b\uff0c\u69cb\u5efa\u5f37\u56fa\u7684\u5b89\u5168\u9632\u79a6\u9ad4\u7cfb\uff0c\u5f15\u9818\u7522\u696d\u81ea\u4fe1\u9081\u5411\u5f8c\u91cf\u5b50\u6642\u4ee3\u3002<\/p>\n\n\n\n \u95dc\u65bc\u71b5\u78bc\u79d1\u6280<\/strong> \u71b5\u78bc\u79d1\u6280\u70ba\u5168\u7403\u9818\u5148\u7684\u786c\u9ad4\u4fe1\u4efb\u57fa\u790e (Hardware Root of Trust) \u6280\u8853\u63d0\u4f9b\u8005\uff0c\u5c08\u6ce8\u65bc\u4ee5PUF (Physical Unclonable Function) \u6280\u8853\u70ba\u6838\u5fc3\u7684\u5b89\u5168IP\u89e3\u6c7a\u65b9\u6848\u3002\u6191\u85c9\u6bcd\u516c\u53f8\u529b\u65fa\u96fb\u5b50\u7684NeoPUF\u539f\u751f\u5bc6\u9470\u6280\u8853\u8207OTP\u5b89\u5168\u5132\u5b58\u57fa\u790e\uff0c\u71b5\u78bc\u805a\u7126\u65bc NeoPUF \u8207\u5168\u68e7\u5b89\u5168\u67b6\u69cb\u7684\u958b\u767c\u8207\u90e8\u7f72\uff0c\u5354\u52a9\u5168\u7403\u6676\u7247\u8207\u7cfb\u7d71\u8a2d\u8a08\u8005\u8fce\u63a5\u91cf\u5b50\u6642\u4ee3\u7684\u8cc7\u5b89\u6311\u6230\uff0c\u6253\u9020\u5177\u5099\u9577\u671f\u97cc\u6027\u7684\u5b89\u5168\u9632\u7dda\u3002\u71b5\u78bc\u79d1\u6280\u6838\u5fc3\u7522\u54c1\u5305\u62ecPUF-PQC (Post-Quantum Cryptography)\u3001PUFcc (Crypto Coprocessor)\u3001PUFrt (Root of Trust)\u3001PUFhsm (Hardware Security Module)\u7b49\u591a\u9805\u5b89\u5168IP\uff0c\u4e26\u9032\u4e00\u6b65\u5e03\u5c40\u4ee5 PUF \u70ba\u57fa\u790e\u7684 Security-as-a-Service \u751f\u614b\u7cfb\uff0c\u70ba\u65b0\u4e00\u4ee3\u9023\u7db2\u88dd\u7f6e\u63d0\u4f9b\u53ef\u4fe1\u7684\u8eab\u5206\u3001\u4fdd\u8b77\u8207\u8a8d\u8b49\u6a5f\u5236\u3002<\/p>\n\n\n\n <\/p>\n","protected":false},"excerpt":{"rendered":" Hsinchu, Taiwan \u2013 January 16th, 2026 \u2014 eMemory Technology Inc., a global leader in embedded non-volatile memory, together with its subsidiary PUFsecurity Corp., a specialist in hardware security silicon IP, today jointly announced a major technological breakthrough. Their collaboratively developed PUF-PQC Post-Quantum Cryptography (PQC) hardware-accelerated solution has officially passed the latest standards certification issued by the National Institute of Standards and Technology (NIST).<\/p>\n","protected":false},"author":20,"featured_media":7738,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[22,295,27],"class_list":["post-7725","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","tag-ememory","tag-pqc","tag-pufsecurity"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7725"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=7725"}],"version-history":[{"count":5,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7725\/revisions"}],"predecessor-version":[{"id":7730,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/7725\/revisions\/7730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media\/7738"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=7725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=7725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=7725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
Leverages inherent manufacturing variations to generate chip-unique identities, serving as the entropy foundation for all cryptographic key generation and ensuring keys are unclonable and tamper-resistant.<\/li>\n\n\n\n
Delivers high-quality, NIST-compliant physical entropy, ensuring the unpredictability required for PQC algorithms.<\/li>\n\n\n\n
Provides highly reliable non-volatile memory for secure storage of sensitive data and cryptographic material, establishing a complete and trusted chain of security.<\/li>\n<\/ul>\n\n\n\n
\n\n\n\n
\u529b\u65fa\u96fb\u5b50\u651c\u624b\u71b5\u78bc\u79d1\u6280 PUF-PQC \u7372 NIST FIPS 205 \u8207 SP 800-208 \u8a8d\u8b49\uff0c\u9054\u6210\u5168\u65b9\u4f4d\u5f8c\u91cf\u5b50\u5bc6\u78bc\u5b78\u9632\u8b77\u91cc\u7a0b\u7891<\/strong><\/p>\n\n\n\n\n