Tech Design Forums
Technique
secure boot
secure boot
All
(2)
Articles
(2)
October 16, 2018
Why AI needs security
As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
Expert Insight | Topics:
IP - Selection
| Tags:
AI security
,
key management
,
secure boot
| Organizations:
Synopsys
January 25, 2018
Using hardware secure modules to protect SoCs
Building secure SoCs takes a methodical approach, careful study of possible attacks, and embedded hardware that can provide a Root of Trust
Article | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
authentication
,
key management
,
root of trust
,
secure boot
,
validation
| Organizations:
Synopsys
IP Topics
Assembly & Integration
Design Management
Selection
PLATINUM SPONSORS
View All Sponsors
twitter
facebook
RSS
Tech Design Forum
Log In
Register
Sponsors
Briefing
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page
Search