Search results for "crypto"
MCUs are supported by extended development ecosystem
STMicroelectronics has begun volume production of ultra-low-power STM32L45x MCUs, supported by a development ecosystem based on the easy-to-use and affordable STM32Cube platform.The STM32L451, STM32L452, and STM32L462 lines integrate a DFSDM, enabling advanced audio capabilities such as noise cancellation or sound localisation on an inexpensive microcontroller. Up to 512 Kbyte on-chip Flash and 160 Kbyte SRAM provide generous code and data storag...
Bringing quantum computing closer to reality
For 60 years computers have become smaller, faster and cheaper. But engineers are approaching the limits of how small they can make silicon transistors and how quickly they can push electricity through devices to create digital ones and zeros.That limitation is why Stanford electrical engineering Professor Jelena Vuckovic is looking to quantum computing, which is based on light rather than electricity.
Addressing security issues at the design stage
A major issue faced by IoT manufacturers is the constraints of getting a product to market on time and on budget. And, due to these pressures security can often be sidelined during the process. Here, Ken Munro, Partner in Pen Test Partners, the ethical hacking company offers some advice.
How secure is HF radio?
Whether used for humanitarian, critical or military communications, security is essential in high frequency (HF) radio transmission. But just how secure is HF radio? It depends on the equipment being used.
Europe to push new laws to access encrypted apps data
As from June the European Commission will push for access to data stored in the cloud by encrypted apps, according to EU Justice Commissioner Věra Jourová.Claiming that politician across Europe have been pushing for this, speaking publicly Jourová said that she will outline ‘three or four options’ that range from voluntary agreements by business to strict legislation.
Public-key crypto protects IoT devices and data paths
Designing in crypto-strong authentication to protect IoT device hardware, plus providing authenticity and integrity of small data transactions between the device and the cloud, is now easier and quicker with the MAXREFDES155# DeepCover embedded security reference design from Maxim Integrated Products.
SEGGER releases cryptographic library emCrypt
SEGGER has announced immediate availability of its emCrypt cryptographic algorithm library. emCrypt is a complete software library of cryptographic algorithms, written entirely in C, with high performance. It can easily be fine-tuned to favor smaller or faster code. Hardware acceleration for various popular MCU families such as STM32, Kinetis, EFM32 and LPC18S/43S is available.
USB-C solution chosen for lightweight notebook
LG Electronics has selected CypressSemiconductor’s EZ-PD CCG3 controllers, what the company claims to be the industry’s most highly integrated USB-C solutions, for three new models of its lightweight LG Gram notebook. CCG3 integrates multiple components and supports the new USB-C UCSI connection standard, enabling LG to meet its size and feature requirements. CCG3 is featured in the LG Gram 13”, LG Gram 14” and LG Gram 15&...
New smart modular PLC is compact and communicative
Enabling machine and system builders to bring streamlined, modern automation concepts to life, the new XC300 modular PLC from Eaton is useful, especially when combined with the XN300 I/O system and XV300 touch panel.With high performance communication features, the modular controller’s fast cycle times enables higher productivity rates for the machine.
Dual-mode Bluetooth device for POS and medical devices
Flexible and robust with added security features, Texas Instruments' newest, dual-mode Bluetooth device has been introduced. The CC2564C with Bluetooth 4.2 is a suitable solution for Point Of Sale (POS), medical and wearable devices. The CC2564C updated design features the advanced Bluetooth LE secure connection pairing. This foundation enables pairing using the Elliptic Curve Diffie-Hellman (ECDH) public key cryptography algorithm.