Tagged with

cybersecurity

Latest Posts

In this podcast we talk with Pim Tuyls, CEO of Intrinsic ID, about the different criteria to consider when choosing a PUF or Physical Unclonable Function and why PUFs are preferred over other approaches to get identities or cryptographic keys into chips or devices and to build a secure key vault.

Choosing a Physical Unclonable Function (PUF)