All items tagged with Cryptography and Security (13)

| Hardware Security Modules (HSMs) are electronic devices using various hardware protection schemes against unauthorized reading of the secret...

by lux36

| Interested in espionage and security? Join the Elektor Spy Contest! Read carefully through Luka Matic's book and try to find better answers...

by lux36

| Looking for a good book to get you through Christmas? How about the “Handbook on DIY Electronic Security and Espionage”? Learn all the trick...

by lux36

| If you are interested in espionage and security, you may like to participate in our Spy Contest! Analyze my book, find (better) answers/solu...

| This is a submission from Microchip on its CryptoAutomotive™ security IC, the TrustAnchor100. The cryptographic companion device supports in...

| This is a submission from Microchip on a new cryptography-enabled microcontroller, the CEC1712 MCU with Soteria-G2 custom firmware – designe...

| Mouser Electronics, Inc., the authorized global distributor with the newest semiconductors and electronic components, is now stocking the PS...

| Securing Internet of Things (IoT) endpoints is a difficult task. Engineers cannot simply repurpose PC security solutions for the IoT environ...

| Microchip announces the ATECC608A CryptoAuthentication™ device, a secure element that allows developers to add hardware-based security to th...

PREMIUM

| Are your communications secure? There are many overhyped "cryptophones" and crypto software programs available today, but can you really tru...