www.design-reuse-china.com
Search Solutions  
OK
17 "PUF Based" SoCs

1
Fully Digital Physically Unclonable Function (PUF)
In cryptography, a key is used by ciphers to transform a plaintext into cipher text or cipher text into plaintext. The key is a sensitive information, therefore it must be generated by a true random s...

2
Secure-IC Securyzr Fully Digital Physically Unclonable Function (PUF) - PQC Ready
A Physically Unclonable Function (PUF) is a security mechanism that uses the inherent physical variations of a device to generate a unique, unclonable output. This output can be used as a cryptogra...

3
PUF-based Secure Crypto Co-processor
PUFcc (former known as PUFiot) is a novel high-security Crypto Coprocessor IP, combining a Hardware Root of Trust with a full suite of cryptographic algorithms, forming an adaptable security module suitable for integration into a wide array of system architectures.

4
PUF-based Secure Crypto Coprocessor
PUFcc is a novel high-security Crypto Coprocessor. Compared to traditional security SoC design (embedded HSM with secure core or discrete crypto components), PUFcc can provide a much easier-to-adopt h...

5
PUFauth - PUF-based Symmetric Authentication
PUFauth provides an integrated PUF-based hardware solution including protocol design, key protection and session-key generation.

6
PUFcc7 - Upgraded PUF-based Crypto Coprocessor (Compliant with TLS 1.3 / FIPS 186-5)

PUFcc Series Crypto Coprocessor IP presents its uniqueness in the combination of a PUF-based hardware root of trust with a full suite of cryptographic algorithms. The whole IP is further protected ...


7
PUFenc - PUF-based Crypto Engine
PUFenc uses NeoPUF as the key for encryption. It extracts a NeoPUF value to generate the crypto engine key.

8
PUFkeygen - PUF-based Key Generator
PUFkeygen is an IP for hardware acceleration-based symmetric key generation.

9
PUFkeyst - PUF-based Key Storage
PUFkeyst uses the value of NeoPUF to entangle with the data itself to reach high security level without using KEK.

10
PUFtrng - PUF-based True Random Number Generator
Our PUFtrng leverages the perfect randomness of NeoPUF to generate the qualified TRNG without the need for high-quality entropy sources.

11
PUFuid - PUF-based Unique Identity
Generating chip secret with inborn root-of-trust

12
Physical Unclonable Function (PUF)
The Physical Unclonable Function (PUF) is a fully integrated analog IP generating a stable number from random local process variations.

13
Quantum-Driven Hardware Root-of-Trust - Physical Unclonable Function (PUF)
Our patented semiconductor design is the most secure hardware root-of-trust available to create unforgeable device identities and cryptographic keys.

14
Quantum-Driven Hardware Root-of-Trust - Physical Unclonable Function (PUF)
Our patented semiconductor design is the most secure hardware root-of-trust available to create unforgeable device identities and cryptographic keys. QDID stands for Quantum-Driven Identity. QDID is a...

15
Intrinsic ID QuiddiKey 300: First Ever PSA Certified Level 3 RoT Component IP
Digital trust is critical for the continued success of the IoT, so security, reliability, and privacy are top concerns. New legislations are driving improved security practices as well as an increased...

16
QuiddiKey 100 - Small Footprint PUF IP to Create, Wrap and Manage Keys
The number of connected devices, machines or sensors that are linked with each other over open communication networks on the internet of things (IoT) has exploded. Processes are remotely monitored thr...

17
Via-PUF Security Chip for Root of Trust
ICTK s Via-PUF solutions let you build the most reliable root of trust for IoT supply chain safety.

 Back

业务合作

广告发布

访问我们的广告选项

添加产品

供应商免费录入产品信息

© 2023 Design And Reuse

版权所有

本网站的任何部分未经Design&Reuse许可,
不得复制,重发, 转载或以其他方式使用。