fish fry
Subscribe Now

Communications and Authentications

NFC and CryptoAuthentication

All Aboard! The embedded design train is leaving the station. In this week’s Fish Fry we’re getting into some serious embedded design business. We’re talking about the newest in component security and the wonders of near field communications (NFC).  My first guest is Greg Proehl of STMicroelectronics. Greg and I are going to get into the who, what, when, and how of NFC and why you might need it for your next design. Also this week, we’re checking out the newest security algorithms and component authentication with Alex Dean of Atmel. Alex and I chat about the differences between symmetric and asymmetric key algorithms and what elliptic curve cryptography is all about.


 

Listen to this episode

Download this episode (right click and save)

Fish Fry Links – June 28, 2013

More Information about STMicroelectronics’ NFC Portfolio

New episode of Chalk TalkHD – Enabling New Applications With NFC Connectivity and Energy Harvesting

Atmel Expands CryptoAuthentication Portfolio with Elliptical Curve Asymmetric Key Authentication Solutions

Leave a Reply

featured blogs
Oct 14, 2019
My working life includes a lot of writing – blogs, articles, conference papers and white papers are typical of what I produce. A common factor of my writing is that it is aimed to be technical and instructive. What I do not like writing is sales pitches. I can accept th...
Oct 14, 2019
In 1995, I attended a seminar in which the presenter told us that copper was dead.  This sort of statement is not new. The connector market is filled with armchair pundits who predict the demise of everything from D-Subminiature connectors (which are very much alive and ...
Oct 14, 2019
I often recall a colleague rather wistfully describing his early days in the industry when everyone was on one floor and people could walk over to colleagues' desks to discuss work, the weekend,... [[ Click on the title to access the full blog on the Cadence Community s...
Oct 11, 2019
[From the last episode: We looked at subroutines in computer programs.] We saw a couple weeks ago that some memories are big, but slow (flash memory). Others are fast, but not so big '€“ and they'€™re power-hungry to boot (SRAM). This sets up an interesting problem. When ...