New Design For Trusted Data


Recently, I wrote about Fully Homomorphic Encryption (FHE from now on) which I think is going to be something big that you will hear lots about in the future. Here's the reason I think it is going to be big. The people who care the most about security, such as financial institutions, governments, and companies with huge amounts of valuable data (such as semiconductor companies, or social m... » read more

Power/Performance Bits: Feb. 25


Thinner, flexible touchscreens Researchers from RMIT University, University of New South Wales, and Monash University developed a thin, flexible electronic material for touchscreens. The material is 100 times thinner than current touchscreen materials. The new screens are still based on indium-tin oxide (ITO), a common touchscreen material. However, a liquid metal printing approach was used... » read more

Power/Performance Bits: Jan. 21


Two-layer MRAM Scientists at Tokyo Institute of Technology propose a simpler MRAM construction that could perform faster with less power than conventional memories. The idea relies on unidirectional spin Hall magnetoresistance (USMR), a spin-related phenomenon that could be used to develop MRAM cells with an extremely simple structure. The spin Hall effect leads to the accumulation of elect... » read more

Uses And Limitations Of AI In Chip Design


Raik Brinkmann, president and CEO of OneSpin Solutions, sat down with Semiconductor Engineering to talk about AI changes and challenges, new opportunities for using existing technology to improve AI, and vice versa. What follows are excerpts of that conversation. SE: What's changing in AI? Brinkmann: There are a couple of big changes underway. One involves AI in functional safety, where y... » read more

Bolstering Security For AI Applications


Hardware accelerators that run sophisticated artificial intelligence (AI) and machine learning (ML) algorithms have become increasingly prevalent in data centers and endpoint devices. As such, protecting sensitive and lucrative data running on AI hardware from a range of threats is now a priority for many companies. Indeed, a determined attacker can either manipulate or steal training data, inf... » read more

Security Tradeoffs In A Shifting Global Supply Chain


Experts at the Table: Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. The first part of this discussion ca... » read more

Why Data Is So Difficult To Protect In AI Chips


Experts at the Table: Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. The first part of this discussion ca... » read more

IP Security In FPGAs


Quinn Jacobson, strategic architect at Achronix, talks about security in FPGAs, including how to prevent reverse engineering of IP, how to make sure the design is authentic, and how to limit access to IP in transit and in the chip. » read more

Full Disk Encryption of Solid State Drives and Root of Trust


File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security feature... » read more

Quantum Random Numbers Future-Proof Encryption


It may be a decade or more before quantum computers become common enough that we'll find out whether "post-quantum cryptography" will stand up to genuine quantum computers. In the meantime, some quantum researchers are peeling off specific functions and turning them into products or companies so that it's possible to take advantage of the potential of quantum computers without actually havin... » read more

← Older posts