Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Edge And IoT Security Turning A Corner


Security is beginning to improve for a wide range of IoT and edge devices due to better tools, the implementation of new standards and methodologies, and an increasing level of collaboration and communication across different market segments that in the past had little or no interaction. Until recently, many vendors in cost-sensitive markets offered the bare minimum of security. To make matt... » read more

How Software-Defined Vehicles Change Auto Chip Design


The shift to software-defined vehicles is changing nearly every aspect of automotive design, from what hardware is added into vehicles, when it gets added, and what gets left behind. Moving key features to software rather than hardware allows carmakers to bring new features to market faster, at a lower cost, and to modify those features more quickly. It is also expected to drive up the value... » read more

Auto Ecosystem Begins Shift To Software-First


Experts at the Table: The automotive ecosystem is in the midst of an intense evolution as OEMs and tiered providers grapple with how to deal with legacy technology while incorporating ever-increasing levels of autonomy, electrification, and software-defined vehicle concepts. Semiconductor Engineering sat down to discuss these and other related issues with Wayne Lyons, senior director for the au... » read more

Chip Industry Week In Review


The 2024 IEEE International Electron Devices Meeting (IEDM) was held this week, prompting a number of announcements from: imec: Proposed a new CFET-based standard cell architecture for the A7 node containing two rows of CFETs with a shared signal routing wall in between, allowing standard cell heights to be reduced from 4 to 3.5T, compared to single-row CFETs. Integrated indium pho... » read more

Why PCIe And CXL Are Essential Interconnects For The AI Era


As the demand for AI and machine learning accelerates, the need for faster and more flexible data interconnects has never been more critical. Traditional data center architectures face several challenges in enabling efficient and scalable infrastructure to meet the needs of emerging AI use cases. The wide variety of AI use cases translate into different types of workloads. Some require high ... » read more

Is In-Memory Compute Still Alive?


In-memory computing (IMC) has had a rough go, with the most visible attempt at commercialization falling short. And while some companies have pivoted to digital and others have outright abandoned the technology, developers are still trying to make analog IMC a success. There is disagreement regarding the benefits of IMC (also called compute-in-memory, or CIM). Some say it’s all about reduc... » read more

Auto Chip Aging Accelerates In Hot Climates


Automotive chips are aging significantly faster than expected in hot climates with sustained high temperatures, raising concerns about the reliability of electrified vehicles over time and whether advanced-node chips are the right choice for safety-critical applications. Many of the most advanced electronics used in vehicles today are ASIL D-compliant, expected to function up to 125° C. But... » read more

Enhancing Compute Security Architecture For New-Age Applications


New-age AI-powered applications are becoming increasingly essential in our daily lives. Continuing to do so requires that these applications and services meet three primary challenges: Achieving high performance for complex compute tasks. Ensuring cost-effectiveness and seamless integration with existing infrastructure. Maintaining robust security and privacy measures. Historicall... » read more

Tools Needed To Track, Catalog Hardware Vulnerabilities


Monitoring for cyberattacks is a key component of hardware-based security, but what happens afterward is equally important. Logging and cataloging identified hardware vulnerabilities to ensure they are not repeated is essential for security. In fact, thousands of weak points have been identified as part of the chip design process, and even posted publicly online. Nevertheless, many companies... » read more

← Older posts