Renesas electronics 32-bit arm Cortex-M microcontroller (MCU) Ra product has been certified by CAVP comprehensive encryption algorithm suite

Renesas Electronics (tse:6723), a global semiconductor solution provider, announced today that the security engine of its 32-bit arm Cortex-M microcontroller (MCU) Ra product family has been certified by the National Institute of standards and Technology (NIST) encryption algorithm verification program (CAVP). The RA product family flexible configuration package (FSP) v3.6.0 and later will contain a […]

Read More

How does blockchain technology improve national governance

the near future, *** “The integrated application of blockchain technology plays an important role in new technological innovation and industrial transformation. We should take blockchain as an important breakthrough in independent innovation of core technology, clarify the main direction, increase investment, strive to overcome a number of key core technologies, and accelerate the development of […]

Read More

How does the blockchain depict a new picture of intellectual property protection

Blockchain and intellectual property governance are currently in an unprecedented period of great development. We should firmly grasp the historical opportunity, give full play to the advantages of blockchain, break through the pain points and difficult problems that have plagued intellectual property governance for a long time, and actively explore the system and mechanism conducive […]

Read More

“Post quantum encryption chip” is available abroad, and the domestic research team “has other plans”?

Recently, a team from Munich University of Technology (tum) created a computer chip that can effectively implement post quantum encryption technology. Post quantum encryption technology is a cryptographic technology that can resist quantum computer attacks. Among them, the word “post” in post quantum encryption does not mean that the technology can not be introduced and used […]

Read More

What is the RFID Security Solution

1 security risks of RFID Technology Tags: RFID tags are easily manipulated by hackers, pickpockets or complaining employees. Network: including competitors or intruders to install illegal readers on the network, and then send the scanned data to others. Data: one of the main benefits of RFID is to increase the transparency of the supply chain, […]

Read More

Analysis of three development stages of computing platform

In the development of information technology in the past century, human beings have been pursuing the development of computing and computing power, and the ultimate pursuit has always been towards the direction of intelligence. With the coming of all digital era of human society, the status and importance of data is rising. In terms of […]

Read More

How will blockchain technology enable new infrastructure

“New infrastructure” is the most popular word in 2020. In short, “new infrastructure” is the short board of future development. The new investment field is a major power for China’s economy to cross the middle-income trap and move towards high-quality development and innovative development. “The investment potential of” new infrastructure “is huge and the economic […]

Read More

Does the object storage in the cloud need to be backed up

Block storage that is not backed up correctly in the cloud can result in data loss, and even though the object storage in the cloud is more elastic, extra care is needed. If the backup is not correct, the data stored in the cloud storage service that cannot be backed up may be lost forever. […]

Read More