Try our mobile app

Intrinsic ID Collaborates with Synopsys to Boost SoC Security and Accelerate Time to Market

Published: 2022-09-06 12:09:00 ET
<<<  go to SNPS company page

Sunnyvale, California--(Newsfile Corp. - September 6, 2022) - Intrinsic ID, the world's leading provider of Physical Unclonable Function (PUF) security IP today announced a renewed collaboration with Synopsys, Inc. to provide pre-verified PUF and hardware secure module (HSM) security solutions that protect connected devices against advanced security threats. The Synopsys tRoot HSM IP now offers easy integration with Intrinsic ID QuiddiKey(R) hardware IP implementing SRAM PUF, enabling designers with little security experience to quickly add system and data protection features to their SoC designs. Additionally, Intrinsic ID CEO Pim Tuyls will be speaking about the collaboration at the Synopsys ARC Processor Summit on Sept 8, 2022 in a talk entitled "Rooting Trust in Hardware with Invisible Keys from SRAM PUF Technology."

To view the full announcement, including downloadable images, bios, and more, click here.

Key Takeaways:

  • The Synopsys tRoot HSM IP now offers easy integration with Intrinsic ID QuiddiKey(R) hardware IP implementing SRAM PUF, enabling designers with little security experience to quickly add system and data protection features to their SoC designs.
  • Intrinsic ID CEO Pim Tuyls will be speaking about the collaboration with Synopsys at the Synopsys ARC Processor Summit on Sept 8, 2022 in a talk entitled: "Rooting Trust in Hardware with Invisible Keys from SRAM PUF Technology."

Cannot view this image? Visit: https://images.newsfilecorp.com/files/7294/136050_figure1_550.jpg

Click image above to view full announcement.


About Intrinsic ID

Intrinsic ID is the world's leading provider of security IP for embedded systems based on PUF technology. The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip. The IP can be delivered in hardware or software and can be applied easily to almost any chip - from tiny microcontrollers to high-performance FPGAs - and at any stage of a product's lifecycle. It is used as a hardware root of trust to protect sensitive military and government data and systems, validate payment systems, secure connectivity, and authenticate sensors.

Contacts:

Toni Sottak 8435304442 toni@wiredislandpr.com

Source: Intrinsic ID

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/136050

SOURCE Reportable, Inc.