TopicTypesDateLinkdoc_categories_hfilterdoc_tags_hfilter
The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification2024-11-26articleotp root-of-trust sram-repair
Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security2024-09-20bookanti-tampering puf pufrt
Hardware Security Book Series 2: PUF-based Solutions and Applications2024-09-13bookpuf pufrt
Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair2024-07-31articleotp root-of-trust sram-repair
Hardware Security Book Series 1: Quantum Tunneling PUF2024-04-30bookpuf
Embracing a More Secure Era with TLS 1.32024-04-01articleiot pufcc7 root-of-trust security tls
Post-Quantum Cryptography (PQC) – On the Road to Preparedness2023-12-22articlecryptogaphy postquantumcryptography pqc root-of-trust
The Challenge of Automotive Hardware Security Deployment2023-09-27articlehardware-security puf root-of-trust
Securing System-on-Chips: Hardware Protection in the Age of Chiplets2023-05-01articlechiplet hardware-security puf root-of-trust
Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor2023-03-21white-paperarm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2
Set-Top Boxes are a growing Cybersecurity Threat2022-11-23articlesecure-otp stb
Securing the AIoT: Safeguarding AI at the Edge2022-08-11articlehardware-security pufcc
Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory2022-07-19webinarflash-protection hardware-security root-of-trust
Why Hardware Root of Trust  Needs Anti-Tampering Design2022-04-18white-paperanti-tampering puf pufrt
Software-Defined Everything doesn’t mean Software-Only Security2022-04-06articlehardware-security
TPM 2.0-Ready: Top Security with PUFcc2022-03-22articlehardware-security pufcc
PUFrt: Solving Chip Security’s Weakest Link2021-12-20white-paperhardware-security puf pufrt root-of-trust
Securing the IC Supply Chain – Integrating PUF-Based hardware security2021-10-06articlehardware-security puf root-of-trust supply-chain
Adopting PUF to Implement Zero Trust Architecture2021-09-30articlehardware-security puf root-of-trust zero-trust
PUFcc: An Essential Crypto Coprocessor for RISC-V2021-09-16white-papercrypto-coprocessor hardware-security pufcc risc-v-architechure
How PUF-based RoT Can Solve IoT Security Issues2021-09-10articlehardware-security root-of-trust
Webinar: The Secure Coprocessor for Secure Supply Chain2021-06-11webinarcrypto-coprocessor hardware-security pufcc root-of-trust
Webinar: PUFcc, The PUF-based Crypto Coprocessor2021-06-10webinarcrypto-coprocessor hardware-security pufcc root-of-trust
Talk: Chip Fingerprints Realize Safer Chip Applications and Services2021-06-08videocrypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust
Vital Ways to Prevent a Cyberattack2021-05-05articlehardware-security
Security Innovations That Are Helping Businesses in 20212021-03-17articlepuf
Standardized PUF-based Solution for Device eID2021-03-02articlecrypto-coprocessor hardware-security puf root-of-trust
PUF is a Hardware Solution for the Sunburst Hack2021-01-28articlehardware-security puf
2020 Security on Chip Tech Forum Highlights2020-12-28articlehardware-security
安全加密協处理器: PUFcc2020-12-16articlecrypto-coprocessor hardware-security puf root-of-trust
量子穿隧PUF信任根: PUFrt2020-12-11articlehardware-security puf root-of-trust
PUF Series 6: The Four Angles of Examining PUF2020-09-15articlepuf
PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application2020-09-14articlehardware-security puf root-of-trust
PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust2020-06-22articlehardware-security puf root-of-trust
PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF2020-06-16articlepuf
PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF2020-06-15articlepuf
PUF Series 1: SRAM PUF is Increasingly Vulnerable2020-06-14articlepuf
RoT: The Foundation of Security2020-05-14articlehardware-security puf root-of-trust
Build Trust in Silicon: A Myth or a Reality?2020-04-23articlehardware-security root-of-trust
Is Blockchain the Silver Bullet of IoT Security?2020-01-15articlehardware-security
Experts Meet on Imperatives of Hardware Security2019-11-26articlehardware-security puf
The Promise of Formal Methods to PUF Security Assurance2019-11-13articlehardware-security puf
PUF: A Crucial Technology for AI and IoT2019-10-15articlepuf
“To be or not to be?” & “To be what?” those are two big questions for Libra!2019-09-12articlecrypto-currency
The good, the bad and the ugly of hardware security2019-09-11articlehardware-security