Found 251 Results

Rambus Tech Days

https://www.rambus.com/rambus-tech-days/

Rambus Tech Days April 19 – 21, 2021 Register Today Rambus Tech Days are three afternoons of deep dive technical presentations covering topics from MACsec to MIPI. Join security and interface technology leaders from Rambus and its partners as they discuss the latest solutions for safeguarding and accelerating data in applications spanning AI/ML, data center, […]

Consumer Privacy and Safety at Risk from Unprotected IoT Devices

https://www.rambus.com/blogs/consumer-privacy-and-safety-at-risk-from-unprotected-iot-devices/

Rambus’ Paul Karazuba recently penned an article for Semiconductor Engineering that takes a closer look at how consumer privacy and safety continue to be at risk from unprotected IoT devices. As Karazuba notes, security cameras represent approximately 47 percent of vulnerable devices installed on home networks. Basic attack techniques that target these devices, says Karazuba, […]

Security is Critical at the Intersection of AI and 5G

https://www.rambus.com/blogs/security-is-critical-at-the-intersection-of-ai-and-5g/

Rambus’ Tim Messegee has penned an article for Semiconductor Engineering that takes an in-depth look at the importance of ensuring security at the intersection of AI and 5G. As Messegee notes, 5G represents nothing less than a revolution in mobile technology with performance that is poised to rival that of wireline networks. “Relative to its […]

Three Top Semiconductor Tech Trends for 2021

https://www.rambus.com/blogs/three-top-semiconductor-tech-trends-for-2021/

As a momentous 2020 fades into the history books, 2021 is expected to be a year of growth and evolution for the semiconductor industry across multiple market segments. Firstly, DDR5 DRAM is slated to enter volume production by the end of 2021, with initial deployments targeting hyperscale data centers. Secondly, AI/ML neural networks – which […]

MACsec Explained: Securing Data in Motion

https://www.rambus.com/blogs/macsec/

Learn everything you need to know about MACsec, also known as Media Access Control Security. For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides […]

The Ultimate Guide to HBM2E Implementation & Selection

https://www.rambus.com/blogs/hbm2e/

This is the most comprehensive guide to selecting and implementing a HBM2E memory IP interface solution. Frank Ferro and Joseph Rodriguez, Senior Directors Product Management at Rambus, hosted a webinar at our Rambus Design Summit discussing HBM2 and HBM2E memory technology. There’s a lot of decisions that need to be made when you’re developing high […]

Root of Trust for FPGAs Product Brief

https://go.rambus.com/root-of-trust-for-fpgas-product-brief#new_tab

The Root of Trust for FPGAs is a fully-programmable embedded FIPS 140-2 certified hardware security Root of Trust co-processor integrated in programmable logic. The Root of Trust for FPGAs is a siloed hardware security block, offering secure execution of user applications, tamper detection and protection, secure storage and handling of keys and security assets, resistance […]

Root of Trust for FPGAs

https://www.rambus.com/security/root-of-trust/root-of-trust-for-fpgas/

Root of Trust for FPGAs Contact Us FPGAs (Field Programmable Gate Arrays) are widely used in industries such as Defense, Telecommunications, Automotive and AI/ML (Artificial Intelligence/Machine Learning) because of their reconfigurability and flexibility. Whether functioning as the essential building blocks of avionics and spacecraft systems, controlling ADAS (Advanced Driver Assisted Systems) systems, or assisting inference […]

A Modern Interpretation of Kerckhoff

https://www.rambus.com/blogs/a-modern-interpretation-of-kerckhoff/

In the late 19th century, Dutch cryptographer Auguste Kerckhoff postulated what has become known as “Kerckhoff’s Principle” — a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. Since Kerckhoff’s days, cryptography has certainly evolved. A modern interpretation of Kerckhoff teaches that you shouldn’t rely on the obscurity of your crypto algorithm, […]

Understanding Anti-Tamper Technology: Part 3

https://www.rambus.com/blogs/understanding-anti-tamper-technology-part-3/

Written by Scott Best for the Rambus Blog In part one of this three-part blog series, we discussed the low-cost attacks that target security chips such as protocol and software attacks, brute force glitch attacks, as well environmental attacks. In part two, we took a closer look at attacks executed by more sophisticated adversaries. These […]

Rambus logo