Asset3 Shutterstock 627837206 1 1540 800 614245ed1385d

Cryptography: Is A Hardware Or Software Implementation More Effective?

Sept. 15, 2021
This Technical Tutorial examines the pros and cons of both hardware and software approaches and walks the user through why dedicated cryptographic hardware provides a better solution for most applications.
This tutorial is part of a series that is designed to provide a quick study guide in cryptography for a product development engineer. Each segment takes an engineering rather than theoretical approach on the topic. In this installment, you'll learn the difference between hardware and software implementations of cryptographic solutions and get insights on some common applications.

Sponsored

Powering next-generation ADAS processors with TI Functional Safety-Compliant buck regulators

The TPS62883-Q1 buck converter delivers up to 30A, supports stackable architectures for over 100A, and meets ASIL D functional safety standards for ADAS. Its high accuracy, flexible...

Altech Disconnect Switches

This video shows you how Altech's Disconnect Switches works.

LTC4286 Positive Hot Swap Controller

ADI's LTC4286 is an integrated solution for hot-swap applications allowing a board to be safely inserted and removed from a live backplane.

How sensor fusion is driving vehicle autonomy forward

As ADAS technology extends to critical, time-sensitive applications such as emergency braking, front-collision warning and avoidance, and blind-spot detection combining data...