Found 205 Results

DDR5 vs DDR4 DRAM – All the Advantages & Design Challenges

Last updated on: February 1, 2023 On July 14th, 2021, JEDEC announced the publication of the JESD79-5 DDR5 SDRAM standard signaling the industry transition to DDR5 server and client dual-inline memory modules (DIMMs). DDR5 memory brings a number of key performance gains to the table, as well as new design challenges. Computing system architects, designers, and […]

Compute Express Link (CXL): All you need to know

Last updated on: December 19, 2022 In this blog post, we take an in-depth look at Compute Express Link ™ (CXL™), an open standard cache-coherent interconnect between processors and accelerators, smart NICs, and memory devices. We explore how CXL is helping data centers more efficiently handle the yottabytes of data generated by artificial intelligence (AI) […]

Inline Memory Encryption Engine

Security IME-IP-340 Inline Memory Encryption Engine IME-IP-340 Inline Memory Encryption (IME) Engine provides just-in-time encryption, decryption and authentication for all memory read and write requests between a host processor and its attached memory. Absent encryption, instruction and data stored in external memory are vulnerable to attack, introspection, or modification as they are loaded and executed. […]


Security RT-1660 Programmable Root of Trustwith DPA and FIA for US Defense The Rambus Root of Trust RT-1660 is a fully programmable, FIPS 140-2 and FIPS 140-3 compliant root-of-security core offering security by design for U.S. Defense mission-critical applications. The RT-1660 protects against a wide range of hardware and software attacks with state-of-the-art anti-tamper security […]

How Rambus is Making Data Faster and Safer in 2022 and Beyond

Throughout 2021 and early 2022, Rambus has continued to make data faster and safer with the launch of key products, industry initiatives, and strategic partnerships. To address the insatiable demand for more bandwidth in the data center, we announced our 8.4 Gbps HBM3-Ready Memory Subsystem, confirmed the sampling of our DDR5 5600 MT/s 2nd-generation RCD chip, demonstrated our PCI Express® (PCIe) 5.0 digital controller IP on leading FPGA platforms, and unveiled our CXL Memory Interconnect Initiative. Looking ahead to 2022 and beyond, these products, initiatives, and partnerships will help power the […]


Security RT-650 Programmable Root of Trust With DPA The Rambus RT-650 Root of Trust is a fully programmable, FIPS 140-2 and FIPS 140-3 compliant hardware security anti-tamper core offering security by design for government and military mission-critical applications. The RT-650 protects against a wide range of hardware and software attacks with state-of-the-art anti-tamper security techniques. […]

PCIE 6.0 – All you need to know about PCI Express Gen6

While the PCI-SIG has announced that the release of the PCI Express® 6.0 (PCIe 6.0) specification should arrive in 2022, Rambus is already addressing the needs of early adopters looking for the most advanced PCIe 6.0 IP solutions for their SoC and ASIC designs. You can find all about the new generation specification in the article below. Contents What is PCIe 6.0? What’s new with PCIe 6.0? Why PCIe 6.0 now? […]

NextChip Selects Rambus Security IP to Secure Apache6 Automotive Processor

Highlights: Rambus RT-640 Root of Trust and MACsec-IP-160 Protocol Engine to protect next-generation NextChip Apache6 SoC Rambus Root of Trust and MACsec engine enable secure boot for centralized domain/zone processors and link protection for Automated Valet Parking (AVP) and other demanding ADAS applications Rambus security solutions meet ISO 26262 ASIL-B reliability and protect mission-critical data […]

Hardware Root of Trust: Everything you need to know

Last updated on: October 29, 2021 As explained in our “Secure Silicon IP Webinar Series“, a root of trust is the security foundation for an SoC, other semiconductor device or electronic system. However, its meaning differs depending on who you ask. For example, the hardware root of trust contains the keys for cryptographic functions and […]

Side-channel attacks explained: everything you need to know

In this blog post, we take an in-depth look at the world of side-channel attacks. We describe how side-channel attacks work and detail some of the most common attack methodologies. We also explore differential power analysis (DPA), an extremely powerful side-channel attack capable of obtaining and analyzing statistical measurements across multiple operations. In addition, we […]