Tech Design Forums
Technique
authentication
authentication
All
(2)
Articles
(2)
January 25, 2018
Using hardware secure modules to protect SoCs
Building secure SoCs takes a methodical approach, careful study of possible attacks, and embedded hardware that can provide a Root of Trust
Article | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
authentication
,
key management
,
root of trust
,
secure boot
,
validation
| Organizations:
Synopsys
June 10, 2016
Laying the foundations of a more secure IoT
The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
Expert Insight | Topics:
Embedded - Architecture & Design
| Tags:
authentication
,
hardware root of trust
,
identification
,
secure Iot
,
signing
| Organizations:
Synopsys
Embedded Topics
Architecture & Design
Integration & Debug
Platforms
User Experience
Tech Design Forum
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page