Performance Efficiency AI Accelerator for Mobile and Edge Devices
Industry Expert Blogs
Setting a Foundation for Security with ReRAMWeebit Nano Blog - Amir Regev, Weebit NanoJun. 15, 2023 |
Today we are surrounded by an ever-increasing array of connected devices. Electronic payments are becoming more popular, and we are keeping more and more personal information in the cloud. At the same time, risks continue to rise as hackers get better and better at breaking down security schemes.
Regardless of the end application, security must be based on a multi-layered approach starting with the deepest embedded hardware. This starts within the manufacturing process of the chips themselves and includes a broad range of hardware primitives serving as security keys such as True Random Number Generator (TRNG) and physical unclonable functions (PUFs).
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- ARM vs RISC-V: Beginning of a new era
- Ecosystem Collaboration Drives New AMBA Specification for Chiplets
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- Why, How and What of Custom SoCs