Tag

hardware security

0 views collected around this technical thread.

Architects' Tech Alliance
Architects' Tech Alliance
Oct 13, 2024 · Fundamentals

Overview of Huawei Kunpeng 920 Processor Architecture and Subsystems

The article provides a detailed technical overview of Huawei's Kunpeng 920 processor, describing its ARM‑based RISC architecture, chip organization, core and cluster layout, security features, IMU management, and the various subsystems such as IO, interrupt, network, SAS, and PCIe.

CPU architectureKunpengRISC
0 likes · 12 min read
Overview of Huawei Kunpeng 920 Processor Architecture and Subsystems
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

Data SecurityMPCSecure Computation
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMemory ProtectionMobile Security
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 16, 2022 · Information Security

Overview of TrustZone‑Based SoC Components and CryptoCell Architecture

The article outlines ARM TrustZone‑enabled SoC components and the CryptoCell architecture, describing its two product families (700 and 300), hardware modules for symmetric and asymmetric cryptography, secure key slots, the CRYS software library, and their roles in secure‑boot, lifecycle management, debugging and data protection.

ARMCryptoCellSOC
0 likes · 8 min read
Overview of TrustZone‑Based SoC Components and CryptoCell Architecture
Efficient Ops
Efficient Ops
Sep 14, 2022 · Operations

Why Hardware-Based Remote Management Beats Software Solutions for Digital Transformation

The article explains how enterprises facing digital transformation challenges can achieve more reliable and secure IT operations by adopting hardware‑based remote management like Intel vPro, which works even when operating systems fail, and how combining hardware and software creates a robust solution for smart manufacturing.

Digital TransformationIT OperationsIntel vPro
0 likes · 8 min read
Why Hardware-Based Remote Management Beats Software Solutions for Digital Transformation
Architects' Tech Alliance
Architects' Tech Alliance
Aug 24, 2021 · Fundamentals

A New Golden Age for Computer Architecture: Trends, Challenges, and Opportunities

This article reviews the evolution of computer architecture, discusses the end of Dennard scaling and Moore’s law, highlights the rise of domain‑specific and RISC‑V designs, examines security challenges, and outlines future opportunities for more efficient, open, and agile hardware solutions.

Computer ArchitectureRISC-Vagile hardware development
0 likes · 41 min read
A New Golden Age for Computer Architecture: Trends, Challenges, and Opportunities
Architects' Tech Alliance
Architects' Tech Alliance
May 16, 2020 · Information Security

Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone

This article explains the concepts of secure boot and trusted boot, discusses their limitations on general-purpose devices, and compares the application workflows and security properties of Intel SGX and ARM TrustZone, highlighting practical usage scenarios such as DRM-protected media.

ARM TrustZoneIntel SGXSecure Boot
0 likes · 10 min read
Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone