Easy Cryptography with Secure Authenticators and Coprocessors (Download)

Download the 7th and final chapter of the Cryptography Handbook. It shows how to easily implement a secure system with secure authenticators and coprocessors.
March 8, 2023

Check out the other chapters in the Communication Series:  The Cryptography Handbook

Here, we'll recap some of the basics we’ve learned so far from the Cryptography Handbook series, and then review how we can use what we’ve learned. Along with a few well-designed secure authenticators, we’ll show how to utilize them in some amazingly simple but very secure real-life solutions.

Sign up for Electronic Design Newsletters
Get the latest news and updates.