www.design-reuse-china.com
   As technology advances, more security demands are rising from the IoT, AI, fintech, autonomous-driving industries. Sole reliance on software-based security is simply not enough anymore. If you want to protect your assets with flexible and cost-effective hardware security IPs, let PUFsecurity help you find the best solutions. We can help improve your chances against a cyberattack in a world full of external threats. With our NeoPUF (physical unclonable function) technology from our parent company, eMemory, we have a series of security solutions that combine both digital and analog capabilities to solve your security concerns. PUFsecurity offers both basic and advanced solutions for hardware security.
  • Identity recognition (UID)
  • True random number generator (tRNG)
  • Key generation
  • Secure storage of sensitive information and keys
Solutions: PUFrt: hardware root of trust
  • Fast and lower-power tRNG
  • Reliable chip ID
  • Advanced OTP read/write protection
PUFiot: IoT security
  • PUFrt integrated
  • OSCCA compliance
  • KDF/KWP NIST compliance
  • BUS and DMA support
PUFse: Secure Element
  • PUFiot integrated
  • OTA support
  • Secure boot
  • Side-channel attack resistant
In addition to our expertise, we also have industrial advantages including over 43 process platform from eMemory’s foundry partners. Our brand spirit is forward-thinking. We are continuously innovating and improving our processes to stay ahead in this connected world. By choosing PUFsecurity, you are also choosing the best choice for embedded hardware security solutions.
   
9 SoCs

1
PUF-based Secure Crypto Co-processor
PUFcc (former known as PUFiot) is a novel high-security Crypto Coprocessor IP, combining a Hardware Root of Trust with a full suite of cryptographic algorithms, forming an adaptable security module suitable for integration into a wide array of system architectures.

2
PUFauth - PUF-based Symmetric Authentication
PUFauth provides an integrated PUF-based hardware solution including protocol design, key protection and session-key generation.

3
PUFcc7 - Upgraded PUF-based Crypto Coprocessor (Compliant with TLS 1.3 / FIPS 186-5)

PUFcc Series Crypto Coprocessor IP presents its uniqueness in the combination of a PUF-based hardware root of trust with a full suite of cryptographic algorithms. The whole IP is further protected ...


4
PUFenc - PUF-based Crypto Engine
PUFenc uses NeoPUF as the key for encryption. It extracts a NeoPUF value to generate the crypto engine key.

5
PUFkeygen - PUF-based Key Generator
PUFkeygen is an IP for hardware acceleration-based symmetric key generation.

6
PUFkeyst - PUF-based Key Storage
PUFkeyst uses the value of NeoPUF to entangle with the data itself to reach high security level without using KEK.

7
PUFtrng - PUF-based True Random Number Generator
Our PUFtrng leverages the perfect randomness of NeoPUF to generate the qualified TRNG without the need for high-quality entropy sources.

8
PUFuid - PUF-based Unique Identity
Generating chip secret with inborn root-of-trust

9
PUFrt - PUF-based Hardware Root of Trust
With PUF as the core, the root of trust provides a foundation of trust and security for the chip system. It also provides a 1024-bit identification code with a physical unclonable function and a true random number generator that complies with the NIST SP800-90B/SP-800-22 standard specifications.

 Back

业务合作

广告发布

访问我们的广告选项

添加产品

供应商免费录入产品信息

© 2023 Design And Reuse

版权所有

本网站的任何部分未经Design&Reuse许可,
不得复制,重发, 转载或以其他方式使用。