| | | | | | | | | This article explores the numerous risks associated with FPGA security and the recommended methods to keep the device secure. |
|
|
|
Sponsored | | Memory devices, like Datakey CryptoAuthentication memory tokens, are used to validate a user or device and securely transfer information to an embedded system. Learn about symmetric authentication and terms like challenge, nonce, digest and more. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | It’s game time, and your design calls for a portable memory device. Customize your memory device at Datakey.com and select: Memory Technology, Capacity, Serial Interface, Form Factor, Color, Logo and Customization Options. |
|
|
|
| |
| | Sponsored | Designed for use as a credential for small, hand-held embedded applications, Mini-Bar memory tokens are a little larger than a microSD card but are thicker, stronger, and easier to handle. Memory options include SPI or I2C EEPROM in 16 or 256 Kbits. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | When security or reliability concerns preclude the use of USB flash drives or SD cards, RUGGEDrive memory tokens offer a more secure and robust solution. Eliminate USB ports or SD card slots, so uncontrolled flash drives and SD cards won’t plug in. |
|
|
|
| |
| | Sponsored | Incorporating a secure memory device into an embedded design doesn’t have to be hard. Learn how to integrate a Datakey CryptoAuthentication memory token. View product info, white paper, application note, learning lab video and more. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | | Datakey is the recognized leader in Crypto Ignition Keys (CIKs). CIKs are essential in many security applications and serve as a primary way to restrict access and de-classify equipment. This paper explains how to implement a removable memory device as a CIK. |
|
|
|
Sponsored | | This paper explains wireless coexistence and shows four ways to link/pair two or more devices to prevent unintentional crosstalk. Using a portable memory device to transfer device ID information between transmitter and receiver is examined in detail. |
|
|
|
| |
| | |
|
|
| | |
|
| | |
|