Search Solutions  
10 "PUF Based" Solutions

Fully Digital Physically Unclonable Function (PUF)
In cryptography, a key is used by ciphers to transform a plaintext into cipher text or cipher text into plaintext. The key is a sensitive information, therefore it must be generated by a true random s...

PUF-based Secure Crypto Co-processor
PUFiot is a novel high-security crypto co-processor

PUFauth - PUF-based Symmetric Authentication
PUFauth provides an integrated PUF-based hardware solution including protocol design, key protection and session-key generation.

PUFenc - PUF-based Crypto Engine
PUFenc uses NeoPUF as the key for encryption. It extracts a NeoPUF value to generate the crypto engine key.

PUFkeygen - PUF-based Key Generator
PUFkeygen is an IP for hardware acceleration-based symmetric key generation.

PUFkeyst - PUF-based Key Storage
PUFkeyst uses the value of NeoPUF to entangle with the data itself to reach high security level without using KEK.

PUFtrng - PUF-based True Random Number Generator
Our PUFtrng leverages the perfect randomness of NeoPUF to generate the qualified TRNG without the need for high-quality entropy sources.

PUFuid - PUF-based Unique Identity
Generating chip secret with inborn root-of-trust

QuiddiKey - Secure PUF IP to Create, Wrap and Manage Keys
QuiddiKey is Intrinsic ID hardware IP which enables device manufacturers and designers to secure their products with internally generated, device-unique cryptographic keys without the need for adding ...

Physical Unclonable Function (PUF)
The Physical Unclonable Function (PUF) is a fully integrated analog IP generating a stable number from random local process variations.


Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2021 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.