TopicTypesDateLinkdoc_categories_hfilterdoc_tags_hfilter
The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification2024 - 11 - 26articleotp root-of-trust sram-repair
Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security2024 - 09 - 20bookanti-tampering puf pufrt
Hardware Security Book Series 2: PUF-based Solutions and Applications2024 - 09 - 13bookpuf pufrt
Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair2024 - 07 - 31articleotp root-of-trust sram-repair
Hardware Security Book Series 1: Quantum Tunneling PUF2024 - 04 - 30bookpuf
Embracing a More Secure Era with TLS 1.32024 - 04 - 01articleiot pufcc7 root-of-trust security tls
Post-Quantum Cryptography (PQC) – On the Road to Preparedness2023 - 12 - 22articlecryptogaphy postquantumcryptography pqc root-of-trust
The Challenge of Automotive Hardware Security Deployment2023 - 09 - 27articlehardware-security puf root-of-trust
Securing System-on-Chips: Hardware Protection in the Age of Chiplets2023 - 05 - 01articlechiplet hardware-security puf root-of-trust
Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor2023 - 03 - 21white-paperarm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2
Set-Top Boxes are a growing Cybersecurity Threat2022 - 11 - 23articlesecure-otp stb
Securing the AIoT: Safeguarding AI at the Edge2022 - 08 - 11articlehardware-security pufcc
Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory2022 - 07 - 19webinarflash-protection hardware-security root-of-trust
Why Hardware Root of Trust  Needs Anti-Tampering Design2022 - 04 - 18white-paperanti-tampering puf pufrt
Software-Defined Everything doesn’t mean Software-Only Security2022 - 04 - 06articlehardware-security
TPM 2.0-Ready: Top Security with PUFcc2022 - 03 - 22articlehardware-security pufcc
PUFrt: Solving Chip Security’s Weakest Link2021 - 12 - 20white-paperhardware-security puf pufrt root-of-trust
Securing the IC Supply Chain – Integrating PUF-Based hardware security2021 - 10 - 06articlehardware-security puf root-of-trust supply-chain
Adopting PUF to Implement Zero Trust Architecture2021 - 09 - 30articlehardware-security puf root-of-trust zero-trust
PUFcc: An Essential Crypto Coprocessor for RISC-V2021 - 09 - 16white-papercrypto-coprocessor hardware-security pufcc risc-v-architechure
How PUF-based RoT Can Solve IoT Security Issues2021 - 09 - 10articlehardware-security root-of-trust
Webinar: The Secure Coprocessor for Secure Supply Chain2021 - 06 - 11webinarcrypto-coprocessor hardware-security pufcc root-of-trust
Webinar: PUFcc, The PUF-based Crypto Coprocessor2021 - 06 - 10webinarcrypto-coprocessor hardware-security pufcc root-of-trust
Talk: Chip Fingerprints Realize Safer Chip Applications and Services2021 - 06 - 08videocrypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust
Vital Ways to Prevent a Cyberattack2021 - 05 - 05articlehardware-security
Security Innovations That Are Helping Businesses in 20212021 - 03 - 17articlepuf
Standardized PUF-based Solution for Device eID2021 - 03 - 02articlecrypto-coprocessor hardware-security puf root-of-trust
PUF is a Hardware Solution for the Sunburst Hack2021 - 01 - 28articlehardware-security puf
2020 Security on Chip Tech Forum Highlights2020 - 12 - 28articlehardware-security
安全加密協处理器: PUFcc2020 - 12 - 16articlecrypto-coprocessor hardware-security puf root-of-trust
量子穿隧PUF信任根: PUFrt2020 - 12 - 11articlehardware-security puf root-of-trust
PUF Series 6: The Four Angles of Examining PUF2020 - 09 - 15articlepuf
PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application2020 - 09 - 14articlehardware-security puf root-of-trust
PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust2020 - 06 - 22articlehardware-security puf root-of-trust
PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF2020 - 06 - 16articlepuf
PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF2020 - 06 - 15articlepuf
PUF Series 1: SRAM PUF is Increasingly Vulnerable2020 - 06 - 14articlepuf
RoT: The Foundation of Security2020 - 05 - 14articlehardware-security puf root-of-trust
Build Trust in Silicon: A Myth or a Reality?2020 - 04 - 23articlehardware-security root-of-trust
Is Blockchain the Silver Bullet of IoT Security?2020 - 01 - 15articlehardware-security
Experts Meet on Imperatives of Hardware Security2019 - 11 - 26articlehardware-security puf
The Promise of Formal Methods to PUF Security Assurance2019 - 11 - 13articlehardware-security puf
PUF: A Crucial Technology for AI and IoT2019 - 10 - 15articlepuf
“To be or not to be?” & “To be what?” those are two big questions for Libra!2019 - 09 - 12articlecrypto-currency
The good, the bad and the ugly of hardware security2019 - 09 - 11articlehardware-security