Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Product List
ATSHA204-Slide5

All the security functions of the ATSHA204 are implemented using the industry-standard SHA-256 hash algorithm. SHA-256 is a part of the latest set of high-security algorithms recommended by governments and cryptographic experts. Customers using the CryptoAuthentication™ IC with the SHA-256 algorithm automatically strengthen and extend the life of their platforms. 

PTM Published on: 2012-01-06