{"id":4896,"date":"2023-05-22T01:55:25","date_gmt":"2023-05-22T01:55:25","guid":{"rendered":"https:\/\/www.pufsecurity.com\/%e8%b3%87%e6%ba%90%e5%88%86%e4%ba%ab-2\/"},"modified":"2023-05-22T01:55:25","modified_gmt":"2023-05-22T01:55:25","slug":"%e8%b3%87%e6%ba%90%e5%88%86%e4%ba%ab-2","status":"publish","type":"page","link":"https:\/\/www.pufsecurity.com\/zh-hant\/%e8%b3%87%e6%ba%90%e5%88%86%e4%ba%ab-2\/","title":{"rendered":"\u8cc7\u6e90\u5206\u4eab"},"content":{"rendered":"
<\/th>Topic<\/th>Types<\/th>Date<\/th>Link<\/th>doc_categories_hfilter<\/th>doc_tags_hfilter<\/th><\/tr><\/thead>
<\/td>The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified\u2122 Level 3 RoT Component Certification<\/td>Article<\/a><\/td>2024-11-26<\/td>article<\/td>otp root-of-trust sram-repair<\/td><\/tr>
<\/td>Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security<\/td>Book<\/a><\/td>2024-09-20<\/td>book<\/td>anti-tampering puf pufrt<\/td><\/tr>
<\/td>Hardware Security Book Series 2: PUF-based Solutions and Applications<\/td>Book<\/a><\/td>2024-09-13<\/td>book<\/td>puf pufrt<\/td><\/tr>
<\/td>Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair<\/td>Article<\/a><\/td>2024-07-31<\/td>article<\/td>otp root-of-trust sram-repair<\/td><\/tr>
<\/td>Hardware Security Book Series 1: Quantum Tunneling PUF<\/td>Book<\/a><\/td>2024-04-30<\/td>book<\/td>puf<\/td><\/tr>
<\/td>Embracing a More Secure Era with TLS 1.3<\/td>Article<\/a><\/td>2024-04-01<\/td>article<\/td>iot pufcc7 root-of-trust security tls<\/td><\/tr>
<\/td>Post-Quantum Cryptography (PQC) \u2013 On the Road to Preparedness<\/td>Article<\/a><\/td>2023-12-22<\/td>article<\/td>cryptogaphy postquantumcryptography pqc root-of-trust<\/td><\/tr>
<\/td>The Challenge of Automotive Hardware Security Deployment<\/td>Article<\/a><\/td>2023-09-27<\/td>article<\/td>hardware-security puf root-of-trust<\/td><\/tr>
<\/td>Securing System-on-Chips: Hardware Protection in the Age of Chiplets<\/td>Article<\/a><\/td>2023-05-01<\/td>article<\/td>chiplet hardware-security puf root-of-trust<\/td><\/tr>
<\/td>Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor<\/td>White Paper<\/a><\/td>2023-03-21<\/td>white-paper<\/td>arm crypto-coprocessor hardware-security psa-certified pufcc white-paper-2<\/td><\/tr>
<\/td>Set-Top Boxes are a growing Cybersecurity Threat<\/td>Article<\/a><\/td>2022-11-23<\/td>article<\/td>secure-otp stb<\/td><\/tr>
<\/td>Securing the AIoT: Safeguarding AI at the Edge<\/td>Article<\/a><\/td>2022-08-11<\/td>article<\/td>hardware-security pufcc<\/td><\/tr>
<\/td>Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory<\/td>Webinar<\/a><\/td>2022-07-19<\/td>webinar<\/td>flash-protection hardware-security root-of-trust<\/td><\/tr>
<\/td>Why Hardware Root of Trust\u00a0 Needs Anti-Tampering Design<\/td>White Paper<\/a><\/td>2022-04-18<\/td>white-paper<\/td>anti-tampering puf pufrt<\/td><\/tr>
<\/td>Software-Defined Everything doesn\u2019t mean Software-Only Security<\/td>Article<\/a><\/td>2022-04-06<\/td>article<\/td>hardware-security<\/td><\/tr>
<\/td>TPM 2.0-Ready: Top Security with PUFcc<\/td>Article<\/a><\/td>2022-03-22<\/td>article<\/td>hardware-security pufcc<\/td><\/tr>
<\/td>PUFrt: Solving Chip Security\u2019s Weakest Link<\/td>White Paper<\/a><\/td>2021-12-20<\/td>white-paper<\/td>hardware-security puf pufrt root-of-trust<\/td><\/tr>
<\/td>Securing the IC Supply Chain – Integrating PUF-Based hardware security<\/td>Article<\/a><\/td>2021-10-06<\/td>article<\/td>hardware-security puf root-of-trust supply-chain<\/td><\/tr>
<\/td>Adopting PUF to Implement Zero Trust Architecture<\/td>Article<\/a><\/td>2021-09-30<\/td>article<\/td>hardware-security puf root-of-trust zero-trust<\/td><\/tr>
<\/td>PUFcc: An Essential Crypto Coprocessor for RISC-V<\/td>White Paper<\/a><\/td>2021-09-16<\/td>white-paper<\/td>crypto-coprocessor hardware-security pufcc risc-v-architechure<\/td><\/tr>
<\/td>How PUF-based RoT Can Solve IoT Security Issues<\/td>Article<\/a><\/td>2021-09-10<\/td>article<\/td>hardware-security root-of-trust<\/td><\/tr>
<\/td>Webinar: The Secure Coprocessor for Secure Supply Chain<\/td>Webinar<\/a><\/td>2021-06-11<\/td>webinar<\/td>crypto-coprocessor hardware-security pufcc root-of-trust<\/td><\/tr>
<\/td>Webinar: PUFcc, The PUF-based Crypto Coprocessor<\/td>Webinar<\/a><\/td>2021-06-10<\/td>webinar<\/td>crypto-coprocessor hardware-security pufcc root-of-trust<\/td><\/tr>
<\/td>Talk: Chip Fingerprints Realize Safer Chip Applications and Services<\/td>Video<\/a><\/td>2021-06-08<\/td>video<\/td>crypto-coprocessor hardware-security puf pufcc risc-v-architechure root-of-trust zero-trust<\/td><\/tr>
<\/td>Vital Ways to Prevent a Cyberattack<\/td>Article<\/a><\/td>2021-05-05<\/td>article<\/td>hardware-security<\/td><\/tr>
<\/td>Security Innovations That Are Helping Businesses in 2021<\/td>Article<\/a><\/td>2021-03-17<\/td>article<\/td>puf<\/td><\/tr>
<\/td>Standardized PUF-based Solution for Device eID<\/td>Article<\/a><\/td>2021-03-02<\/td>article<\/td>crypto-coprocessor hardware-security puf root-of-trust<\/td><\/tr>
<\/td>PUF is a Hardware Solution for the Sunburst Hack<\/td>Article<\/a><\/td>2021-01-28<\/td>article<\/td>hardware-security puf<\/td><\/tr>
<\/td>2020 Security on Chip Tech Forum Highlights<\/td>Article<\/a><\/td>2020-12-28<\/td>article<\/td>hardware-security<\/td><\/tr>
<\/td>\u5b89\u5168\u52a0\u5bc6\u5354\u5904\u7406\u5668: PUFcc<\/td>Article<\/a><\/td>2020-12-16<\/td>article<\/td>crypto-coprocessor hardware-security puf root-of-trust<\/td><\/tr>
<\/td>\u91cf\u5b50\u7a7f\u96a7PUF\u4fe1\u4efb\u6839: PUFrt<\/td>Article<\/a><\/td>2020-12-11<\/td>article<\/td>hardware-security puf root-of-trust<\/td><\/tr>
<\/td>PUF Series 6: The Four Angles of Examining PUF<\/td>Article<\/a><\/td>2020-09-15<\/td>article<\/td>puf<\/td><\/tr>
<\/td>PUF Series 5: PUF based Root of Trust PUFrt for High-Security AI Application<\/td>Article<\/a><\/td>2020-09-14<\/td>article<\/td>hardware-security puf root-of-trust<\/td><\/tr>
<\/td>PUF Series 4: Why a True Hardware PUF is more Reliable as RooT of Trust<\/td>Article<\/a><\/td>2020-06-22<\/td>article<\/td>hardware-security puf root-of-trust<\/td><\/tr>
<\/td>PUF Series 3: The Quantum Tunneling Mechanism of NeoPUF<\/td>Article<\/a><\/td>2020-06-16<\/td>article<\/td>puf<\/td><\/tr>
<\/td>PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF<\/td>Article<\/a><\/td>2020-06-15<\/td>article<\/td>puf<\/td><\/tr>
<\/td>PUF Series 1: SRAM PUF is Increasingly Vulnerable<\/td>Article<\/a><\/td>2020-06-14<\/td>article<\/td>puf<\/td><\/tr>
<\/td>RoT: The Foundation of Security<\/td>Article<\/a><\/td>2020-05-14<\/td>article<\/td>hardware-security puf root-of-trust<\/td><\/tr>
<\/td>Build Trust in Silicon: A Myth or a Reality?<\/td>Article<\/a><\/td>2020-04-23<\/td>article<\/td>hardware-security root-of-trust<\/td><\/tr>
<\/td>Is Blockchain the Silver Bullet of IoT Security?<\/td>Article<\/a><\/td>2020-01-15<\/td>article<\/td>hardware-security<\/td><\/tr>
<\/td>Experts Meet on Imperatives of Hardware Security<\/td>Article<\/a><\/td>2019-11-26<\/td>article<\/td>hardware-security puf<\/td><\/tr>
<\/td>The Promise of Formal Methods to PUF Security Assurance<\/td>Article<\/a><\/td>2019-11-13<\/td>article<\/td>hardware-security puf<\/td><\/tr>
<\/td>PUF: A Crucial Technology for AI and IoT<\/td>Article<\/a><\/td>2019-10-15<\/td>article<\/td>puf<\/td><\/tr>
<\/td>\u201cTo be or not to be?\u201d & \u201cTo be what?\u201d those are two big questions for Libra!<\/td>Article<\/a><\/td>2019-09-12<\/td>article<\/td>crypto-currency<\/td><\/tr>
<\/td>The good, the bad and the ugly of hardware security<\/td>Article<\/a><\/td>2019-09-11<\/td>article<\/td>hardware-security<\/td><\/tr><\/tbody><\/table>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-resource-list.php","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-4896","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/pages\/4896"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=4896"}],"version-history":[{"count":1,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/pages\/4896\/revisions"}],"predecessor-version":[{"id":4897,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/pages\/4896\/revisions\/4897"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=4896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}