Side-Channel Attacks On Post-Quantum Cryptography


By Mike Hamburg and Bart Stevens Device security requires designers to secure their algorithms, not only against direct attacks on the input and output, but also against side-channel attacks. This requirement is especially notable for cryptographic algorithms, since they have a regular, well-understood structure, and the secrets they process often give access to much more information. Sid... » read more

Functional Safety Insights For Today’s Automotive Industry


As cars have evolved into rolling computing platforms, vehicle safety now extends well beyond the traditional seat belt. While they still take us to the grocery store, they also integrate advanced technology, enabling the rapid fusion of multimodal data through edge devices such as sensors and actuators. Modern vehicles offer unprecedented safety, but they can contain between one to three th... » read more

Simulations à la Carte: Infusing SPICE Models For A Tasty Design Experience


Have you ever noticed how the simplest dishes become unforgettable with just the right seasoning? As an Ecuadorian, I’ve learned this firsthand. A touch of “ají”—a traditional chili sauce—can transform any meal into something extraordinary. The tamarillo-based hot sauce is my personal favorite. It’s not just a condiment; it’s an experience. And when it comes to power electronics,... » read more

eMMC: The Embedded Storage Powering On-Device AI


In today's world of increasingly intelligent devices, efficient and reliable storage is paramount. Embedded MultiMediaCard (eMMC) has emerged as a crucial component that acts as the internal solid-state non-volatile storage for a wide range of devices handling on-device AI processing. Think of it as a compact, high-performing internal drive built directly into your phone, smart camera, or other... » read more

AI Native: What Does It Mean For Embedded Processing?


Artificial intelligence (AI) continues transforming how users interact with technology. AI-powered chatbots like ChatGPT, along with advancements in data analytics and mobile technology, have contributed to high expectations among tech users. Consumers want and expect faster, more personalized, and smarter experiences — whether they're controlling a smart home device or speaking to a chatbot ... » read more

Embarrassingly Parallel Problems: Definitions, Challenges And Solutions


One of the reasons GPUs are regularly discussed in the same breath as AI is that AI shares the same fundamental class of problems as 3D graphics. They are both embarrassingly parallel. Embarrassingly parallel problems refer to computational tasks that: Exhibit independence: Subtasks do not rely on intermediate results from other tasks. Require minimal interaction: Parallel task... » read more

AI For The Edge: Why Open-Weight Models Matter


The rapid advancements in AI have brought powerful large language models (LLMs) to the forefront. However, most high-performing models are massive, compute-heavy, and require cloud-based inference, making them impractical for edge computing. The recent release of DeepSeek-R1 is an early, but unlikely to be the only, example of how open-weight AI models, combined with efficient distillation t... » read more

The Rise Of Generative AI On The Edge


Artificial intelligence (AI) and machine learning (ML) have undergone significant transformations over the past decade. The revolution of convolutional neural networks (CNNs) and recurrent neural networks (RNNs) is evolving toward the adoption of transformers and generative AI (GenAI), marking a pivotal shift in the field. This transition is driven by the need for more accurate, efficient, and ... » read more

Tailoring Root Of Trust Security Capabilities To Specific Customer Needs


The cybersecurity threat landscape is dynamic and rapidly evolving. Indeed, attackers are constantly finding new ways to exploit critical vulnerabilities across a wide range of applications and devices. Protecting data and devices requires secure processes running on systems and networks. A Root of Trust is the foundation on which all secure operations of a computing system depend. It contai... » read more

Accelerating The Shift To Software-Defined Vehicles


The automotive E/E architecture is undergoing a significant transformation, driven by the vision of a software-defined vehicle (SDV). This shift is leading to a change from traditional distributed and domain-based architectures to more centralized and mixed domain-zone architectures. Central Electronic Control Units (ECUs) are now powered by sophisticated system-on-chips (SoCs) that combine com... » read more

← Older posts