New Horizons for Chip Design

Archive for the 'Cryptography' Category


Why Now Is the Time to Address Quantum Computing’s Impact on Cryptography

Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.

Continue Reading...

Posted in Application Security, Cryptography, IP, Quantum Computing, Security


Making Crypto History: The Women of Bletchley Park

Remember the movie The Imitation Game? The film depicts Alan Turing and his team at Bletchley Park trying to crack the Enigma machine and decrypt German intelligence codes for the British government during World War II. While modern cryptography relies on complex algorithms and asymmetric key encryption to keep data secure, prior to the 1970s cryptanalysis was mostly a manual process used for military purposes.

Continue Reading...

Posted in Cryptography


Harnessing the Power of Women in Tech: a USA Today Feature

Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.

Continue Reading...

Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD


NIST Validates Synopsys Cryptography IP Software Library

Chip designers can use Synopsys technology to accelerate Cryptographic Module Validation Program (CMVP) and Federal Information Processing Standard (FIPS) 140-2 certification for applications requiring high levels of security. FIPS 140-2 validation is only required if a hardware security module is to be sold to the U.S. government and if it uses cryptography in a security system that handles sensitive but unclassified information. However, it can also be a powerful security product differentiator in the commercial market.

Continue Reading...

Posted in Cryptography, IP