A look at the steps necessary to validate implementations of the cryptographic algorithms that are used to protect today’s devices and communications infrastructure.
Software validation strategies will become increasingly important as cars become more complex, connected and autonomous.
FinFET processes and libraries are maturing, enabling designers to explore the best ways to take advantage of the capabilities of the new transistor design
Considering the issue of functional safety verification in automotive systems design, within the context of ISO26262
Mentor's chairman and CEO has dug into why chip sales forecasts often miss the target and suggests some tools for assessing the Internet of Things.
Analysts say there is a $1B market on the horizon. We talk with Mentor's Jean-Marie Brunet about where such a number could come from.
Emulators have come a long way since their first introduction nearly three decades ago.
To verify large, complex designs and meet time-to-market, you must use both simulation and emulation.
A look at how formal verification strategies can be used to check the security feature of complex SoCs for potential data leakage and data integrity issues
Sequential equivalence checking can help trap errors introduced by clock gate insertion, uninitialised registers, and X propagation issues.
View All Sponsors