PUF
The Role of PUFs in a Trusted Supply Chain
Trusted supply chain provenance and traceability is becoming increasingly important for the quality, reliability, and security of electronic products. It can help reduce costs for tracking and fixing field issues, minimize liability risks and enable higher value in connected IoT applications. In addition, there are significant efficiencies and cost reductions that could be enabled in… Read More »The Role of PUFs in a Trusted Supply Chain
Secure Your Devices with PUF Plus Hardware Root of Trust
Technology experts from Rambus and Intrinsic ID will discuss how combining PUF technology with a hardware Root of Trust can provide robust security for data and devices. The session will start with the fundamentals of PUFs and example use cases. Then we will discuss how the characteristics of PUFs and a hardware Root of Trust… Read More »Secure Your Devices with PUF Plus Hardware Root of Trust
SecuryzrTM iSSP: Simplifying security lifecycle management with PUF
A Physically Unclonable Function or PUF is a function used to generate secret information on-chip. Information such as a secret key / public key pair may be generated on-chip each time it is needed, while the secret key never needs to be output from the chip. Thus the attack surface is reduced, since only the… Read More »SecuryzrTM iSSP: Simplifying security lifecycle management with PUF