Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security

Part 2 of this video series provides a high-level overview of the technologies in embedded system security. Learn how the cryptographic tools of Maxim’s secure authenticators help verify the authenticity and integrity of firmware distributed to IoT