Education
   
   

General Hardware Intrinsic Security (HIS) Information

Collaborative Results

   
   

Hardware Intrinsic Security BackgrounderHardware Intrinsic Security backgrounder
>> download PDF

Conquering Copycats: Attacks Fail Against HISConquering Copycats: Attacks Fail Against HIS
By SiVenture and Intrinsic-ID (paper)
>> download PDF
   

Presentation Hardware Intrinsic Security reliability presentationHardware Intrinsic Security reliability presentation
>>
download PDF

SRAM validated with HISSRAM validated with HIS
By Virage Logic and Intrinsic-ID (paper)
>> download PDF
   
Hardware Intrinsic Security Initiative Frequently Asked Questions (FAQs)
>> download PDF
 
   
   

HIS Advisory Meeting November 7, 2012

HIS Advisory Meeting November 16, 2011

   
   

Anti-Tamper and Security for Embedded Defense Applications
By
Robert Braden, Bradtec Security Consultants
>> download PDF

Customizable System-on-Chips (cSoCs): The New Platform for Custom Security Applications
By Rich Newell, Microsemi
>> download PDF

   

Confidentio-CS, the Application Security Anchor
By Geert-Jan Schrijen, Intrinsic-ID
>> download PDF

Pairing Applications and Hosting Smart Devices Thanks to Silicon Biometry
Emmanuel Prouff, Oberthur Technologies
>> download PDF

   

Enabling Next-Gen Secure Services in Mobile
By Amit Rohatgi, MIPS Technologies
>> download PDF

A Glimpse at Security in Automotive
By Fabrice Poulard, Renesas Europe

>> download PDF
   
  Company Introduction
Job de Haas, Riscure
>>
download PDF
   
Confidentio
By Geert-Jan, Intrinsic-ID, Confidentio
>> download PDF
   
   

HIS Advisory Meeting May 25, 2011

   
   

Crypto in the Wild
By Christof Paar, University of Bochum
>> download PDF

 
   

Review of Physical Attacks on HID Structures
By John Walker, SiVenture
>> download PDF

 
   
Software-Hardware binding Solutions with Quiddikey
By Ilze Eicchorn, Intrinsic-ID
>>
download PDF
 
   

Use Case: Control Word Protection
By Geert-Jan Schrijen, Intrinsic-ID

>>
download PDF