Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.
Continue Reading...
Posted in Application Security, Cryptography, IP, Quantum Computing, Security
Learn how analog and mixed-signal (AMS) verification technology, which we developed as part of DARPA’s POSH and ERI programs, emulates analog designs.
Continue Reading...
Posted in Aerospace and Government, Application Security, Security, Verification
We share 4 strategies for protecting advanced SoCs & chip designs, including chip design tools embedded with security standards & third-party certifications.
Continue Reading...
Posted in Aerospace and Government, Security
We explore security for SoC interfaces and share how SoC design can enhance data security by protecting devices through authentication and encryption.
Continue Reading...
Posted in IP, Security
Learn how AI-powered cameras and neural network image processing enable everything from smartphone portraits to machine vision and automotive safety features.
Continue Reading...
Posted in Artificial Intelligence, Automotive, Internet of Things, IP, Robotics, Security
We explore the importance of cloud security in cloud-based chip design and verification, and unpack the key pillars of security in our cloud EDA tools.
Continue Reading...
Posted in Cloud, EDA, IP, Security, Verification
Explore automotive cybersecurity standards, news, and best practices through blog posts from our experts on connected vehicles, automotive SoCs, and more.
Continue Reading...
Posted in Automotive, Security
We explain the world of counterfeit chips, including types of fake chips, chip design techniques to prevent counterfeiting, and the global forces at play.
Continue Reading...
Posted in Malware, Security, Verification
Learn about automotive cybersecurity best practices and NHTSA guidelines for securing OTA vehicle software updates to protect connected vehicles.
Continue Reading...
Posted in Automotive, Security
Explore the NHTSA’s automotive cybersecurity best practices for protecting ECUs against attacks from (or through) connected aftermarket car accessories.
Continue Reading...
Posted in Automotive, Security