Back To Schedule
Thursday, June 27 • 2:55pm - 3:20pm
SES6: How SHA-3 Cryptographic Authentication Protects Against Substandard Sensor Clones

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

The rise of substandard sensor clones and device counterfeiting present increasing threats to embedded system integrity and can degrade end-user service-level expectations. As a result, designers are under pressure to guarantee that the sensors inside their devices are genuine and will deliver the most accurate data available. Learn how to use SHA3-256, the latest industry-standard cryptographic hash algorithm, to efficiently reduce the risk of substandard sensor use and device counterfeits.

avatar for Scott Jones

Scott Jones

Managing Director, Embedded Security, Maxim Integrated
Scott Jones, Managing Director, Embedded Security at Maxim Integrated Scott Jones is Managing Director of Embedded Security at Maxim Integrated, where he leads a team responsible for secure authentication products. With more than 15 years at Maxim Integrated, Scott is responsible... Read More →

Thursday June 27, 2019 2:55pm - 3:20pm PDT
Room 230C