Realize the IC design protection andthe IC authenticity verification throughthe Security-by-Design approach
Realize the IC designprotection and the IC authenticity verification throughthe Security-by-Design approach

TRustworthy Architecture, Cryptography, and Evaluation for IoT systems

NEWS

A paper was accepted at AsianHOST 2024

Tomosuke Ichioka, Yohei Watanabe, and Yuko Hara got a paper accepted at AsianHOST 2024. Congratulations!

PROJECT

What the project aims for

Development ofDesign Fundamentalsfor Trustworthy IoT Systems

PUBLICATONS

Publications

You can see publications related to our product.

See details