Search results for "cryptography"
Bridging divides and powering technological progress at HiPEAC 2023
Taking place in the technology hub of Toulouse, the 18th edition of the HiPEAC conference will take place on 16-18 January 2023.
Wireless microcontrollers with SESIP3 security, tailored for IoT devices
STMicroelectronics’ STM32WBA52 microcontrollers (MCUs) combine Bluetooth LE 5.3 connectivity with ultra-low-power modes, advanced security, and a broad selection of peripherals familiar to STM32 developers.
Hyperstone to show S9 and security solutions at embedded world
Hyperstone has announced they will be exhibiting at the embedded world conference in Nuremberg. The company’s focus in 2023 is enabling secure and reliable solutions for robust and demanding industrial code and data storage systems.
Quantum computing: A quantum of solace for the players?
Quantum technologies have three primary applications: computing, communication, and sensing.
Hyperstone to showcase S9 and security solutions at the embedded world 2023
Hyperstone has announced they will be exhibiting at the embedded world Conference in Nuremberg.
ETSI secures critical infrastructures against attacks
ETSI secured critical infrastructures against cyber quantum attacks with new TETRA algorithms.
NXP’s MCX N microcontrollers usher in new era of smart, efficient Edge processing
NXP Semiconductors has announced the MCX N94x and MCX N54x, the first families in the N series of the new MCX microcontroller portfolio.
Electronic Specifier presents the Cyber Security forum at electronica
Electronic Specifier is once again looking forward to hosting the Cyber Security forum at electronica this year!
Applications processors deliver safe AI-enabled edge platforms
The i.MX 95 family is the newest addition to NXP Semiconductors i.MX 9 series of applications processors.
Securing embedded systems using the PSoC 64
The number of products being connected to the Internet continues to grow at an exponential rate. The problem facing many product teams is that embedded software developers don’t have sufficient security experience. Lack of experience can lead to overlooked security requirements, security gaps, and poor implementation. The result is connected systems that are poorly protected and are low-hanging fruit for theft ofintellectual property, along...