July 11, 2018
Choosing the right crypto processor implementation involves a complex set of design tradeoffs between speed, area, power consumption and flexibility. Using consistent benchmarks can help explore your options.
November 6, 2017
The challenge for designers is to find ways of providing high levels of security in low-cost devices that have become worthwhile targets because of their role as gateways to more valuable information.
November 24, 2015
Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
June 4, 2012
A side-channel attack is a form of reverse engineering that takes advantage of the information leakage from electronic circuitry. And it is a major risk to design security.