• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • English
  • Investor Relations
  • Resource Library
  • Newsroom
  • Blog
  • Careers
  • Support Center
Rambus Logo

Rambus

At Rambus, we create cutting-edge semiconductor and IP products, spanning memory and interfaces to security, smart sensors and lighting.

  • Products
      • All
          • Memory Interface Chips
          • DIMM Chipsets
          • DDR5 DIMM Chipset
          • DDR4 NVRCD
          • DDR4 Register Clock Driver
          • DDR4 Data Buffer
          • CXL Memory Interconnect Initiative
          • Interface IP
          • Memory PHYs
          • GDDR6 PHY
          • HBM3 PHY
          • HBM2E PHY
          • DDR4 PHY
          • More…
          • SerDes PHYs
          • PCIe 6.0 PHY
          • PCIe 5.0 PHY
          • 32G C2C PHY
          • 32G PHY
          • 28G PHY
          • More…
          • Digital Controllers
          • Memory Controllers
          • CXL & PCI Express Controllers
          • MIPI Controllers
          • Video Compression and Forward Error Correction Cores
          • Security IP
          • Root of Trust Solutions
          • Security Protocol Engines
          • Inline Cipher Engines
          • Crypto Accelerator Cores
          • DPA Countermeasures
          • Software Protocols & Crypto Toolkits
          • Anti-Counterfeiting
          • Provisioning and Key Management
      • Memory Interface Chips
        • DIMM Chipsets
          • DDR5 DIMM Chipset
          • Non-Volatile DDR4 Registering Clock Driver
          • DDR4 Register Clock Driver
          • DDR4 Data Buffer
          • DDR3 Register Clock Driver
          • DDR3 Isolation Memory Buffer
        • CXL Memory Interconnect Initiative

        • Made for high speed, reliability and power efficiency, our DDR3, DDR4, and DDR5 DIMM chipsets deliver top-of-the-line performance and capacity for the next wave of computing systems. Learn more about our Memory Interface Chip solutions
      • Interface IP
          • Memory PHYs
            • GDDR6 PHY
            • HBM3 PHY
            • HBM2E PHY
            • DDR4 PHY
            • DDR4 Multi-modal PHY
            • DDR3 PHY
          • SerDes PHYs
            • PCIe 6.0 PHY
            • PCIe 5.0 PHY
            • PCIe 4.0 PHY
            • 32G C2C PHY
            • 32G PHY
            • 28G PHY
            • 16G PHY
            • 12G PHY
            • 6G PHY
          • Digital Controllers
            • HBM3 Controller
            • HBM2E Controller
            • GDDR6 Controller
            • LPDDR5 Controller
            • CXL 2.0 Controller
            • PCIe 6.0 Controller
            • PCIe 5.0 Controller
            • MIPI CSI-2/DSI-2 Controllers
            • Video Compression and Forward Error Correction Cores
            • More…

        • With their reduced power consumption and industry-leading data rates, our line-up of memory interface IP solutions support a broad range of industry standards with improved margin and flexibility. Learn more about our Interface IP solutions
      • Security IP
          • Root of Trust Solutions
          • Security Protocol Engines
            • MACsec Engines
            • IPsec, TLS, SSL Multi-Protocol Engines
            • High Speed Public Key Accelerator
          • Inline Cipher Engines
          • Crypto Accelerator Cores
            • DPA Resistant Cores
            • Basic Crypto Blocks
          • Anti-Counterfeiting
            • CryptoFirewall Cores
            • Circuit Camouflage Technology
          • DPA Countermeasures
            • DPA Resistant Cores
            • DPA Resistant Software Libraries
            • DPA Workstation Platform
          • Software Protocols & Crypto Toolkits
            • IPsec Toolkit
            • FIPs Cryptographic Libraries
            • MACsec Toolkit
            • IoT Security Framework
          • CryptoMedia
            • Content Protection Core
            • Content Protection Services
          • Provisioning and Key Management
            • CryptoManager Provisioning
            • CryptoManager Device Key Management

        • From chip-to-cloud-to-crowd, Rambus secure silicon IP helps protect the world’s most valuable resource: data. Securing electronic systems at their hardware foundation, our embedded security solutions span areas including root of trust, tamper resistance, content protection and trusted provisioning. Learn more about our Security IP offerings
  • Markets
      • AI & Machine Learning
        • Speed and Security for the Artificial Intelligence & Machine Learning Revolution
          • Products
          • SerDes PHYs
          • Memory PHYs
          • Digital Controllers
          • Memory Interface Chips
          • Root of Trust
          • Crypto Accelerator Cores
          • Protocol Engines
          • Provisioning and Key Management
          • AI & Machine Learning
      • Automotive
        • Providing Performance & Security for the Connected Car
          • Products
          • Memory PHYs
          • SerDes PHYs
          • Digital Controllers
          • Root of Trust
          • PKE Engine
          • MACsec Engines
          • Crypto Accelerator Cores
          • Provisioning and Key Management
          • Explore Automotive
      • Data Center
        • Optimizing capacity, connectivity and capability of the cloud
          • Products
          • SerDes PHYs
          • Memory PHYs
          • Digital Controllers
          • Memory Interface Chips
          • Root of Trust
          • MACsec Engines
          • Software Protocols
          • Provisioning and Key Management
          • See Data Center
      • Edge
        • Catching a tidal wave of data
          • Products
          • Memory PHYs
          • SerDes PHYs
          • Digital Controllers
          • Root of Trust
          • Crypto Accelerator Cores
          • Protocol Engines
          • Software Protocols
          • Discover Edge
      • Government
        • Securing Mission-critical Systems
          • Products
          • Root of Trust
          • Protocol Engines
          • Anti-Tamper Cores
          • Provisioning and Key Management
          • DPA Workstation Platform
          • SerDes PHYs
          • Memory PHYs
          • Digital Controllers
          • See Government
      • IoT
        • Making IoT Data Safe & Fast
          • Products
          • Root of Trust
          • TLS Toolkits
          • Provisioning and Key Management
          • Memory PHYs
          • SerDes PHYs
          • Digital Controllers
          • Explore IoT
  • Resources
    • Inventions
    • Buying Guide
    • Resource Library
      • Webinars
      • Product Selector
  • About
      • Corporate Overview
      • Leadership
      • Inventors
      • Careers
      • Locations
      • Investor Relations
      • Newsroom
      • Blog
      • Events
      • Partnerships
      • Certifications
      • Corporate Responsibility
      • Contact
Home > Press Releases > Corporate > Media Alerts > Cryptography Research Executives to Speak at RSA Conference 2013

Cryptography Research Executives to Speak at RSA Conference 2013

SAN FRANCISCO, CALIFORNIA, UNITED STATES – 02/22/2013

Who: Cryptography Research, Inc.
Where: RSA Conference 2013
Moscone Convention Center
San Francisco, CA
When: February 25–March 1, 2013

At the RSA Conference 2013, executives from Cryptography Research (CRI) will lead two sessions that address side-channel attacks. The first session includes a live demonstration on how keys can be extracted from Suite B Crypto algorithms, while the second covers how developers can efficiently test for side-channel leakage. CRI will also participate in a day-long seminar teaching important, essential security and technology concepts.

Also at the conference, Paul Kocher, president and chief scientist at CRI, will participate as a judge of the Innovation Sandbox, a half-day program dedicated to exploring and evaluating new and promising information security technologies.

In its booth (#2225) at the show, CRI will be demonstrating and discussing its differential power analysis (DPA) countermeasures and its hardware-based CryptoFirewall™ core. For additional details, visit: www.cryptography.com.

Cryptography Research Presentations:

Monday, February 25, 2013

Title: Security Basics Seminar
8:30 a.m.–4:30 p.m.
Benjamin Jun, vice president & chief technology officer at CRI and executives at BioCatch, Bloomberg LP, Cheswick.com, iSEC Partners, Omgeo and RSA

In this day-long course, Benjamin Jun will join other security thought-leaders to discuss some of the most important security principles and technologies to participants. The course is designed to lay a foundation of essential concepts that will enhance participants’ understanding of the advanced security issues that will be discussed throughout the RSA Conference. In particular, Jun will lead a 45-minute discussion on “Crypto101/Encryption Basics, SSL & Certificates” starting at 1:15 p.m.

Title: New Technology Innovation Sandbox
1:00 p.m.–5:30 p.m.
Paul Kocher, president and chief scientist at CRI, and executives at Greylock Partners, In-Q-Tel, Sophos and Venture Capital Journal

In this half-day program, Paul Kocher and other leading security authorities will explore and evaluate new technologies that promise to transform the information security industry, now and in the future, including the “Most Innovative Company at RSA Conference 2013” award.

Wednesday, February 27, 2013

Title: Suite B Crypto, Keys, and Side Channel Attacks
9:20 a.m.–10:20 a.m. – Room 310
Mark Marson, technical director at CRI and Pankaj Rohatgi, technical director of hardware security solutions at CRI

NSA’s Suite B approved crypto is strong when implemented properly. But common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. This session will highlight how keys can be extracted from all three algorithms and how developers and product integrators can address side channel vulnerabilities.

Thursday, February 28, 2013

Title: Is Your Design Leaking Keys? Efficient Testing for Side-Channel Leakage
1:40 p.m.–2:00 p.m. – Room 132
Benjamin Jun, vice president and CTO at CRI and Pankaj Rohatgi, technical director of hardware security solutions at CRI

From mobile apps to HSMs, many systems succumb to side-channel attacks. Until recently, designers and evaluators confirmed product security with costly and time-consuming penetration tests. Improved test approaches can quickly and reliably identify whether a device has unacceptable side-channel leakage. Developers can use these tests in conjunction with existing automated security tools.

About Cryptography Research
Cryptography Research (CRI), a division of Rambus Inc. (NASDAQ: RMBS), is a leader in semiconductor security research and development. Established by internationally renowned cryptographer Paul Kocher, CRI develops and licenses innovative technologies in areas including tamper resistance, content protection, anti-counterfeiting, network security, and financial services. Over seven billion security products are made each year under license from CRI. Security systems designed by CRI scientists and engineers protect hundreds of billions of dollars in commerce annually. Additional information is available at www.cryptography.com.

Footer

About

  • Corporate Overview
  • Leadership
  • Careers
  • Locations
  • Investor Relations
  • News
  • Corporate Responsibility

Products

  • Memory PHYs
  • SerDes PHYs
  • Digital Controllers
  • Server DIMM Chipsets
  • Root of Trust Solutions
  • Provisioning and Key Management
  • Protocol Engines
  • Crypto Accelerator Cores
  • Software Protocols
  • DPA Countermeasures
  • Anti-Counterfeiting
  • CryptoMedia

Markets

  • AI & Machine Learning
  • Automotive
  • Data Center
  • Edge
  • Government
  • IoT
  • Pay TV

Resources

  • Resource Library
  • Webinars
  • Inventions
  • Buying Guide
  • Contact

Copyright © 2023 Rambus.com. All Rights Reserved. Privacy Policy | Trademark & Guidelines

  • Facebook icon
  • Twitter icon
  • YouTuve icon
  • LinkedIn icon
  • Blog icon