Our Physical Unclonable Function (PUF) Products

Hardware Intrinsic Security™ – our leading PUF technology

  • Cryptographic key from silicon fingerprint

  • No secret on chip

  • All process nodes

  • Certified reliability and security



How does our Physical Unclonable Function (PUF) work

  • Step 1: uncontrollable variations
    fixed during manufacturing

  • Step 2: SRAM cells have
    preferred startup state

  • Step 3: Unique pattern ->
    silicon 'PUF' fingerprint

  • Step 4: Turned to cryptographic key ->
    standard certified crypto

Our Physical Unclonable Function (PUF) Products

Physical Unclonable Functions (PUF): a new security technology for scalable cryptographic key management and asset protection for IoT endpoints leveraging uncontrollable nano-scale variations in silicon chips

Our Customers

Protect integrated circuits with PUF, from small microcontrollers and sensors to large application processors and FPGAs.
Embedded security for devices and component based on leading PUF technology
Leverage PUF to protect sensitive key material. Enable in-the-field provisioning and personalisation of devices.
Chip identification and counterfeit detection using PUF fingerprint

Latest News

Recent Tweets


Are you on the East Cost? Meet us at the HOST symposium on hardware security at hostsymposium.org