Fundamentals of DeepCover Secure Authentication

2022-10-04

Learn the principles behind DeepCover® Secure Authentication and how, through advanced physical security, you can easily achieve low-cost IP protection, clone prevention, and peripheral authentication for new and existing systems. We review the ECDSA and SHA-256 cryptographic algorithms and provide an overview of secure authenticator ICs and their common applications.

Fundamentals of DeepCover Secure Authentication

2022-10-04
Learn the principles behind DeepCover® Secure Authentication and how, through advanced physical security, you can easily achieve low-cost IP protection, clone prevention, and peripheral authentication for new and existing systems. We review the ECDSA and SHA-256 cryptographic algorithms and provide an overview of secure authenticator ICs and their common applications.