cryptography


July 11, 2022

Fault simulator tackles intrusive hacks

Optima DA has turned its high-throughput fault-simulation technology to the checking protections against aggressive, intrusive hacks.
Article  |  Topics: Blog - EDA  |  Tags: , , , ,   |  Organizations:
February 21, 2018

Arm to push integrated SIM for secure IoT

Arm plans to use its cryptography cores and technology from its Simulity Labs acquisition to SIM-based security into IoT devices.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
September 12, 2016

Synopsys adds ultra-low power security processor IP

Ultra-low power security processor IP includes defences against side-channel attacks, data and instruction encryption, DSP options for sensor processing and more.
Article  |  Topics: Blog - IP, - Product  |  Tags: , , ,   |  Organizations:
May 25, 2016

ECC crypto code and core aim for home automation

Oberon Microsystems has ported a set of low-overhead cryptographic codes suitable for Apple's HomeKit to the Cortus APS3RP 32bit processor core.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
April 20, 2015

Leakage analysis checks IP cores against crypto vulnerability

The Athena Group says it has developed countermeasures against side-channel attacks for its IP that offer the best protection currently available.
Article  |  Topics: Blog - IP  |  Tags: , , ,   |  Organizations: ,
January 13, 2014

Inside Secure to offer IP for mobile hardware vaults

Inside Secure has developed a set of certification-ready hardware IP modules that can be used stand-alone or in conjunction with ARM's TrustZone
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , ,   |  Organizations:

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors