
Is Post-Quantum Cryptography Necessary?
The burning question in some security scientists’ minds these days is: “Will post-quantum cryptographic algorithms be necessary in the future?” Hanno Böck writes in the
Home > Root of Trust > Page 8
The burning question in some security scientists’ minds these days is: “Will post-quantum cryptographic algorithms be necessary in the future?” Hanno Böck writes in the
Jon Martindale of Digital Trends recently sat down with Ben Levine, Rambus’ senior director of product management, to discuss the ever-growing importance of designing secure
Security researcher Yifan Lu recently published a detailed paper that examines how voltage glitching causes critical timing violations in CMOS behavior. More specifically, Lu closely
We’ve all heard about micro-architectural vulnerabilities, Meltdown, Spectre, and Foreshadow. Volumes have been written about them in the trade and popular press. Indeed, they are the
Do you know what CVEs are? Unless you’re linked up with security or cryptographic groupies, you probably don’t. Virtually everyone in our society is subjected
Rich Quinnell, veteran semiconductor industry reporter, has written an EE Times article with the headline, RISC-V on the Verge of Broad Adoption. This is one