Search results for "cryptography"
Security whitepaper helps developers meet GDPR requirements
A comprehensive whitepaper on security aspects has been produced by Rutronik. It will help developers, product managers, and buyers to create secure switching and system concepts, thereby also meeting the requirements of the GDPR (General Data Protection Regulation), which becomes legally enforceable on 25th May 2018.
The next generation of automotive security on show at CES
This week’s CES show in Las Vegas will see G+D Mobile Security and M2MD demo the Communications Gateway and the new Mobile Key solution that authenticates vehicle drivers and enables vehicle functions, such as unlock and start, from a smartphone application.
Infineon receives two awards for contactless security chip
Infineon Technologies has been recognised with two SESAMES Awards for the world's first post-quantum cryptography implementation on a contactless security chip.
A comprehensive portfolio for your Industry 4.0 needs
Industry 4.0 was a term coined in 2011 at the Hannover Fair and refers to the fourth industrial revolution. Taking place as far back as the late 18th Century, the first industrial revolution related to the mechanisation of manufacturing. This led to electrification in the early part of the 20th Century (the second industrial revolution).
Merge the worlds of wired and wireless connectivity with sensors
Making it easier for developers to connect sensors from a gateway to the cloud, Texas Instruments has introduced Ethernet connectivity to the SimpleLink microcontroller (MCU) platform, a single hardware, software and tool platform for wired and wireless MCUs.
Scientists solve the enigma of brain data
Cracking the German Enigma code is considered to be one of the decisive factors that hastened Allied victory in World War II. Now researchers have used similar techniques to crack some of the brain’s mysterious code.By statistically analysing clues intercepted through espionage, computer science pioneers in the 1940s were able to work out the rules of the Enigma code, turning a string of gibberish characters into plain language to expose Ge...
You can’t steal a key that isn’t there
The security market and its needs have evolved, and security attacks have become more sophisticated over time. The requirements placed on the market to stay ahead of the hackers has also increased significantly as everything around us has become more connected.
Crossover processors offer best of micro/MCU worlds
The i.MX RT crossover processors from NXP Semiconductors are available at Mouser Electronics. Combining the high performance of a processor with the real-time functionality and ease-of-use of a microcontroller, the i.MX RT series supports a wide range of applications, including industrial and home automation, Internet of Things (IoT) gateways, robotics, motor control, and audio subsystems.
Key component enables large-scale quantum computing
A team at the University of Sydney and Microsoft, in collaboration with Stanford University in the US, has miniaturised a component that is essential for the scale-up of quantum computing. The work constitutes the first practical application of a new phase of matter, first discovered in 2006, the so-called topological insulators.Beyond the familiar phases of matter - solid, liquid, or gas - topological insulators are materials that operate as ins...
Synopsys accelerates FIPS 140-2 certification
Synopsys has announced it has successfully validated the DesignWareCryptography Software Library through the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CAVP). To earn validation, the DesignWare Cryptography Software Library passed a full suite of validation tests for secure functions including block ciphers (AES, DES), digital signatures (RSA and ECC based), secure hashing (SHA-1, 2 and 3) an...