Synopsys Multi Die Webinar 800x100
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 302
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 302
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

CEO Interview: Dr. Andreas Kuehlmann of Cycuity

CEO Interview: Dr. Andreas Kuehlmann of Cycuity
by Daniel Nenni on 02-28-2025 at 8:00 am

Andreas 2022 Headshot cropped (2)

Dr. Andreas Kuehlmann, Executive Chairman and CEO at Cycuity, has spent his career across the fields of semiconductor design, software development, and cybersecurity. Prior to joining Cycuity, he helped build a market-leading software security business as head of engineering at Coverity and, after its acquisition by Synopsys,… Read More


2025 Outlook with Dr Axel Y. Poschmann of PQShield

2025 Outlook with Dr Axel Y. Poschmann of PQShield
by Daniel Nenni on 01-22-2025 at 6:00 am

Axel Poschmann PQShield

Tell us a little bit about yourself and your company.

The PQShield team helped define the new PQC (post-quantum cryptography) standards that will be used to replace current encryption that is vulnerable to attack by quantum computers. Now, we work with international blue-chip organizations, disruptive scale-ups, and national… Read More


Averting Hacks of PCIe® Transport using CMA/SPDM and Advanced Cryptographic Techniques

Averting Hacks of PCIe® Transport using CMA/SPDM and Advanced Cryptographic Techniques
by Kalar Rajendiran on 01-13-2025 at 10:00 am

CMA:SPDM Flow for Establishing a Secure Connection

In today’s digital landscape, data security has become an indispensable feature for any data transfer protocol, including Peripheral Component Interconnect Express (PCIe). With the rising frequency and sophistication of digital attacks, ensuring data integrity, confidentiality, and authenticity during PCIe transport… Read More


Certification for Post-Quantum Cryptography gaining momentum

Certification for Post-Quantum Cryptography gaining momentum
by Don Dingee on 12-16-2024 at 6:00 am

NIST A6046 certificate for Secure-IC, the first security IP and software vendor to achieve certification for post-quantum cryptography

A crucial step in helping any new technology specification gain adoption is certification. NIST has been hard at work establishing more than post-quantum cryptography algorithms – they’ve also integrated the new algorithms into their process for third-party validation testing to ensure implementations are as advertised.… Read More


PQShield Demystifies Post-Quantum Cryptography with Leadership Lounge

PQShield Demystifies Post-Quantum Cryptography with Leadership Lounge
by Mike Gianfagna on 10-31-2024 at 6:00 am

PQShield Demystifies Post Quantum Cryptography with Leadership Lounge

Post-Quantum Cryptography, or PQC provides a technical approach to protect encrypted data and connections when quantum computers can cost-effectively defeat current approaches. Exactly when this will occur is open to much discussion, but the fact is this day is coming, some say in ten years. One of the imperatives is to deploy… Read More


Defect-Pattern Leveraged Inherent Fingerprinting of Advanced IC Package with TRI

Defect-Pattern Leveraged Inherent Fingerprinting of Advanced IC Package with TRI
by Navid Asadizanjani on 10-29-2024 at 10:00 am

Article 1 figure 1 (1)

In the quest to secure the authenticity and ownership of advanced integrated circuit (IC) packages, a novel approach has been introduced in this paper that capitalizes on the inherent physical discrepancies within these components. This method, distinct from traditional strategies like physical unclonable functions (PUFs)… Read More


Electron Beam Probing (EBP): The New Sheriff in Town for Security Analyzing of Sub- 7nm ICs with Backside PDN

Electron Beam Probing (EBP): The New Sheriff in Town for Security Analyzing of Sub- 7nm ICs with Backside PDN
by Navid Asadizanjani on 10-15-2024 at 10:00 am

Screenshot

The outsourcing fabrication of ICs makes them vulnerable to hardware security threats. Security threats such as reverse engineering, insertion of hardware Trojan, and backside contact-less probing to steal cryptographic information can cause financial loss to IP owners and security risk to the system in which these ICs are… Read More


Navigating Frontier Technology Trends in 2024

Navigating Frontier Technology Trends in 2024
by Kalar Rajendiran on 10-09-2024 at 10:00 am

Mena Issler on Stage Silicon Catalyst Sep 19, 2024

Many of you are already familiar with Silicon Catalyst and the value it brings to semiconductor startups, the industry and the electronics industry at large. Silicon Catalyst is an organization that supports early-stage semiconductor startups with an ecosystem that provides tools and resources needed to design, create, and… Read More


PQShield Builds the First-Ever Post-Quantum Cryptography Chip

PQShield Builds the First-Ever Post-Quantum Cryptography Chip
by Mike Gianfagna on 09-23-2024 at 6:00 am

PQShield Builds the First Ever Post Quantum Cryptography Chip

Quantum computing promises to deliver vast increases in processing power. The technology exploits the properties of quantum mechanics to create revolutionary increases in performance. Medical and material science research are examples of fields that will see dramatic improvement when production-worthy quantum computers… Read More


Facing challenges of implementing Post-Quantum Cryptography

Facing challenges of implementing Post-Quantum Cryptography
by Don Dingee on 07-09-2024 at 10:00 am

Template Whitepaper promotion rectangulaire 1

While researchers continue a march for more powerful quantum computers, cybersecurity measures are already progressing on an aggressive timeline to avoid potential threats. The urgency is partly in anticipation of a “store-now-decrypt-later” attack where compromised data, seemingly safe under earlier generations of … Read More