Home > Search
Found 213 Results
In this blog post, we take an in-depth look at the world of side-channel attacks. We describe how side-channel attacks work and detail some of the most common attack methodologies. We also explore differential power analysis (DPA), an extremely powerful side-channel attack capable of obtaining and analyzing statistical measurements across multiple operations. In addition, we […]
Scott Best, Technical Director of Anti-Counterfeiting Products at Rambus, recently penned an article for Semiconductor Engineering that details why it is critical to scale anti-tamper protection to meet escalating threats. What is an anti-tamper protection? As Best notes, anti-tamper tends to be one of the industry’s “catchall phrases” encompassing any countermeasure on a security chip. […]
Rambus’ Paul Karazuba recently penned an article for Semiconductor Engineering that takes a closer look at how consumer privacy and safety continue to be at risk from unprotected IoT devices. As Karazuba notes, security cameras represent approximately 47 percent of vulnerable devices installed on home networks. Basic attack techniques that target these devices, says Karazuba, […]
Rambus’ Tim Messegee has penned an article for Semiconductor Engineering that takes an in-depth look at the importance of ensuring security at the intersection of AI and 5G. As Messegee notes, 5G represents nothing less than a revolution in mobile technology with performance that is poised to rival that of wireline networks. “Relative to its […]
As a momentous 2020 fades into the history books, 2021 is expected to be a year of growth and evolution for the semiconductor industry across multiple market segments. Firstly, DDR5 DRAM is slated to enter volume production by the end of 2021, with initial deployments targeting hyperscale data centers. Secondly, AI/ML neural networks – which […]
Learn everything you need to know about MACsec, also known as Media Access Control Security. For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides […]
This is the most comprehensive guide to selecting and implementing a HBM2E memory IP interface solution. Frank Ferro and Joseph Rodriguez, Senior Directors Product Management at Rambus, hosted a webinar at our Rambus Design Summit discussing HBM2 and HBM2E memory technology. There’s a lot of decisions that need to be made when you’re developing high […]
The Root of Trust for FPGAs is a fully-programmable embedded FIPS 140-2 certified hardware security Root of Trust co-processor integrated in programmable logic. The Root of Trust for FPGAs is a siloed hardware security block, offering secure execution of user applications, tamper detection and protection, secure storage and handling of keys and security assets, resistance […]
Root of Trust for FPGAs Contact Us FPGAs (Field Programmable Gate Arrays) are widely used in industries such as Defense, Telecommunications, Automotive and AI/ML (Artificial Intelligence/Machine Learning) because of their reconfigurability and flexibility. Whether functioning as the essential building blocks of avionics and spacecraft systems, controlling ADAS (Advanced Driver Assisted Systems) systems, or assisting inference […]
In the late 19th century, Dutch cryptographer Auguste Kerckhoff postulated what has become known as “Kerckhoff’s Principle” — a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. Since Kerckhoff’s days, cryptography has certainly evolved. A modern interpretation of Kerckhoff teaches that you shouldn’t rely on the obscurity of your crypto algorithm, […]
