Creating A Modular And Versatile State-of-the-Art Cryptographic Subsystem


As the demand for secure, high-performance silicon continues to grow, chipmakers are seeking cryptographic subsystems that are not only robust and efficient but also adaptable to a wide range of use cases. Whether targeting defense electronics, automotive systems, or industrial IoT, customers are looking for solutions that deliver certified, trusted, and future-proof security capabilities. A... » read more

How Secure Are Analog Circuits?


The move toward multi-die assemblies and the increasing value of sensor data at the edge are beginning to focus attention and raise questions about security in analog circuits. In most SoC designs today, security is almost entirely a digital concern. Security requirements in digital circuits are well understood, particularly in large data centers and at the upper end of edge computing, which... » read more

Blog Review: May 28


Siemens’ Patrick Hope considers how to fully perform post-route signal integrity verification on PCB designs while maintaining the project’s timeline by implementing a progressive verification methodology that enables signal integrity experts to focus on issues that demand their expertise rather than simple errors. Cadence’s Vanessa Do checks out how CXL addresses the constant demand f... » read more

Chip Industry Week in Review


Check out the Inside Chips podcast for our behind-the-scenes analysis. Newly proposed U.S. legislation called the Chip Security Act would use location verification tracking as a tool to help combat chip smuggling. This follows a report by the Economist that showed Taiwan exports of advanced chips to Malaysia in the first quarter has nearly reached 2024 totals, heightening concerns that China... » read more

HBM4 Elevates AI Training Performance To New Heights


Generative and Agentic AI are pushing an extremely rapid evolution of computing technology. With leading-edge LLMs now in excess of a trillion parameters, training takes an enormous amount of computing capacity, and state-of-the-art training clusters can employ more than 100,000 GPUs. High Bandwidth Memory (HBM) provides the vast memory bandwidth and capacity needed for these demanding AI train... » read more

Security Risks Mount For Aerospace, Defense Applications


Supply chain and hardware security vulnerabilities affect all industries, but they pose additional risks for the defense sector. Over-manufacturing and re-manufacturing allow chips from friendly nations to end up in the weapons of adversaries. And side-channel attacks such as power analysis or fault injection, as well as internet-based distributed denial of service (DDoS) attacks, provide a mea... » read more

Radiation, Temperature, Power Challenges For Chips In Space


Mission-critical hardware used in space is not supposed to fail at all, because lives may be lost in addition to resources, availability, performance, and budgets. For space applications, failure can occur due to a range of factors, including the weather on the day of launch, human error, environmental conditions, unexpected or unknown hazards and degradation of parts to chemical factors, aging... » read more

Side-Channel Attacks On Post-Quantum Cryptography


By Mike Hamburg and Bart Stevens Device security requires designers to secure their algorithms, not only against direct attacks on the input and output, but also against side-channel attacks. This requirement is especially notable for cryptographic algorithms, since they have a regular, well-understood structure, and the secrets they process often give access to much more information. Sid... » read more

Extra Safety Measures Needed For Aerospace ICs


Aerospace safety requirements and standards vary depending on whether a spacecraft is manned or unmanned, and how crucial the mission is. The defense contractors designing these spacecraft take various approaches to functional safety based on how critical a component is for the mission to succeed. While losing a few images during an Earth-bound observation may not matter, losing a satellite ... » read more

Cyber Threats Multiply With Commercial Chiplets


The commercialization of chiplets will significantly boost the potential for attacks on hardware, requiring a much broader set of security measures and processes at every level of the supply chain, including traceability from initial design to end of life. Much progress has been made in recent years on security measures, including everything from identifying unusual data traffic inside a chi... » read more

← Older posts