datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech

Security Fundamentals 1: Introduction to Encryption and Digital Signatures

Original Air Date: Mar 19, 2013 | Duration: 60 minutes Webinar
0 17
More Info Less Info

Overview:
Digital security is an increasing concern for designers. Most people involved in embedded system designs have heard of "encryption" and "digital signature", but the real meaning, usages, benefits, and techniques that stand behind these terms are far from being clear to everyone. During this webinar, we will explain the fundamentals of these cryptography techniques as they apply to embedded systems.

Learning Objectives:

  • Understand where we need encryption and digital signature
  • Understand the benefits of security ICs to implement cryptography in embedded systems
  • Understand the algorithms frequently used for encryption and digital signature
  • Understand the difference between asymmetric cryptography and symmetric cryptography and their respective benefits
  • Understand common mistakes to avoid when implementing cryptography in embedded systems
Presenter:
Christophe Tremlet, Security Segment Manager, Maxim Integrated
Christophe Tremlet is a Security Segment Manager for Maxim Integrated in La Ciotat, France. He spent 13 years at STMicroelectronics' Smart Card Division—10 years as a Product Engineer and Product Engineering Manager, and 3 years as an Application Manager. He then joined Innova Card, where he was the Chief Technology Officer for 2 years, until its acquisition by Maxim Integrated. He received his MA in Electrical Engineering from INSA Lyon, France.

17 comments
write a comment

No Avatar

Yursa14Issw Posted Dec 22, 2013

I am exploring this topic for a report I have to write. You have good content and I would like to know if you have any other posts about this? Sacramento hard money loans

reply

No Avatar

ChFti5Ford Posted Dec 29, 2013

I gathered useful information on this point as I am working on a business project. Thank you posting relative information and its now becoming easier to complete this assignment. Bellevue Web Design

reply

No Avatar

bookersharrow Posted Mar 29, 2014

I am working on a business project. Thank you posting relative information and its now becoming easier to complete this assignment. medicine turtle Cherokee Visionssuche indianerreisen

reply

No Avatar

bookersharrow Posted Mar 29, 2014

Thank you posting relative information and its now becoming easier to complete this assignment. Visit this link

reply

No Avatar

bookersharrow Posted Mar 31, 2014

Thank you posting relative information and its now becoming easier to complete this assignment. kamineinsatzwasserfuhrend.de

reply

No Avatar

bookersharrow Posted Apr 9, 2014

elative information and its now becoming easier to complete this assignment. zielona kawa cena

reply

No Avatar

sw308495 Posted Apr 2, 2014

During this webinar, we will explain the fundamentals of these cryptography techniques as they apply to embedded systems. Writing a Business Plan

reply

No Avatar

Usama486 Posted Apr 3, 2014

While project managers have an official register of 300,000 institutions and individuals using this software, the real number of beneficiaries can be multiplied exponentially: what is the best type of whey protein

reply

No Avatar

sw308495 Posted Apr 7, 2014

encryption" and "digital signature", but the real meaning, usages, benefits, and techniques that stand behind these terms are far from being clear to everyone. During this webinar, we will explain the fundamentals of these cryptography techniques as they apply to embedded systems. energía solar

reply

No Avatar

sw308495 Posted Apr 3, 2014

where he was the Chief Technology Officer for 2 years, until its acquisition by Maxim Integrated. He received his MA in Electrical Engineering from INSA Lyon, France. علاج الادمان

reply

No Avatar

sw308495 Posted Apr 7, 2014

but the real meaning, usages, benefits, and techniques that stand behind these terms are far from being clear to everyone. During this webinar, we will explain the fundamentals of these cryptography techniques as they apply to embedded systems. energías renovables

reply

No Avatar

sw308495 Posted Apr 7, 2014

Thank you posting relative information and its now becoming easier to complete this assignment. energías renovables

reply

No Avatar

sw308495 Posted Apr 7, 2014

we will explain the fundamentals of these cryptography techniques as they apply to embedded systems. Frank lonardelli website

reply

No Avatar

Breman4des Posted Dec 30, 2013

Sometimes it is so hard to find good and useful posts out there when doing research. Now I will send it to my colleagues as well. Thank you for being one of them. Adult Animal Onesies

reply

No Avatar

Lovsho5Tom Posted Jan 3, 2014

I have been assigned to do a report for our school newspaper on this subject, and your post has been beneficial. Can you please add more reference to this topic, thanks. drunk driving lawyer in Glendale Arizona

reply

No Avatar

denimjeans Posted Feb 18, 2014

Security is a major concern which many industries are realising very late. As most industries are being automated and hooked to the internet for remote access and control, they become susceptible to hackers. buy office 2010 ecurity is one concept everybody needs to be aware of. After all, its better to have some level of encryption than none at all!

reply

No Avatar

sw308495 Posted Apr 3, 2014

"encryption" and "digital signature", but the real meaning, usages, benefits, and techniques that stand behind these terms are far from being clear to everyone. During this webinar, we will explain the fundamentals of these cryptography techniques as they apply to embedded systems. Read about brian ludmer law

reply

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page