Selecting The Right Root Of Trust For Your Application And Architecture


A Root of Trust is defined as the security foundation for a semiconductor or electronic system. Any secure function performed by the device or system relies in whole or in part on this Root of Trust. Based in hardware, the Root of Trust handles the cryptographic functions, stores and manages cryptographic keys, and is typically part of the secure boot process providing the foundation for the so... » read more

Growing Challenges For Increasingly Connected Vehicles


Automobiles will become increasingly connected over the next decade, but that connectivity will come at a price in terms of dollars, security, and constantly changing technology. Connectivity involves all parts of a vehicle. It includes everything from autonomous driving to in-cabin monitoring and connected infotainment. And it encompasses external sensors, IoT, V2X, over-the-air communicati... » read more

Navigating The Intersection Of Safety And Security


Automotive ICs can be secure without needing to be safe, but a safety critical IC cannot be safe without also being secure. Addressing the intersection of safety and security in highly complex automotive SoCs is challenging even for veteran project teams. This paper focuses on how these two domains intersect, what to consider when analyzing and implementing both safety and security architect... » read more

Impact Of Increased IC Performance On Memory


Increasing performance in advanced semiconductors is becoming more difficult as chips become more complex. There are more physical effects to contend with, different use cases, and challenges in making memory go faster. In addition, aging effects that once were ignored are now becoming critical concerns. Steven Woo, fellow and distinguished inventor at Rambus, talks about different factors that... » read more

Options Widen For Optimizing IoT Designs


Creating a successful IoT design requires a deep understanding of the use cases, and a long list of tradeoffs among various components and technologies to provide the best solution at the right price point. Maximizing features and functions while minimizing costs is an ongoing balancing act, and the number of choices can be overwhelming. The menu includes SoC selection, OS and software proto... » read more

The Race Toward Mixed-Foundry Chiplets


Creating chiplets with as much flexibility as possible has captured the imagination of the semiconductor ecosystem, but how heterogeneous integration of chiplets from different foundries will play out remains unclear. Many companies in the semiconductor ecosystem are still figuring out how they will fit into this heterogeneous chiplet world and what issues they will need to solve. While near... » read more

Cooling The Data Center


Since British mathematician and entrepreneur Clive Humby coined the rallying cry, “Data is the new oil,” some 20 years ago, it has been an upbeat phrase at data science conferences. But in engineering circles, that increasingly includes a daily grind of hardware challenges, and chief among them is how to cool the places where all that data is processed and stored. An estimated 65 zettaby... » read more

Week In Review: Auto, Security, Pervasive Computing


Rambus will begin selling Arm's CryptoCell embedded security platform and CryptoIsland root-of-trust cores, setting the stage for a much broader push by Rambus into security for a wide range of connected devices, and ultimately into security as a service. Under the terms of the deal, Rambus' customers will be able to license Arm IP directly from Rambus. For Arm's existing customers, there will ... » read more

Enabling New Server Architectures With The CXL Interconnect


The ever-growing demand for higher performance compute is motivating the exploration of new compute offload architectures for the data center. Artificial intelligence and machine learning (AI/ML) are just one example of the increasingly complex and demanding workloads that are pushing data centers to move away from the classic server computing architecture. These more demanding workloads can be... » read more

Securing IoT Devices With Lightweight Cryptography


The National Institute of Standards and Technology (NIST) recently announced the selection of a new family of cryptographic algorithms called ASCON, which have been developed for lightweight cryptography applications. In this blog, we will explore what lightweight cryptography is and why it is worth considering for specific Internet of Things (IoT) use cases. In summary, lightweight cryptogr... » read more

← Older posts Newer posts →