1 / 27
文档名称:

飞思卡尔汽车电子微控制器产品路线图.pdf

格式:pdf   页数:27
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

飞思卡尔汽车电子微控制器产品路线图.pdf

上传人:qujim2013 2013/5/21 文件大小:0 KB

下载得到文件列表

飞思卡尔汽车电子微控制器产品路线图.pdf

文档介绍

文档介绍:TM
21 August 2011
Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t
he Energy Efficient Solutions logo, mobileGT, , QorIQ, StarCore and Symphony
are trademarks of Freescale Semiconductor, Inc., Reg. . Pat. & Tm. Off. BeeKit, BeeStack,
ColdFire+, , Flexis, is, MXC, Platform in a Package, Processor Expert, QorIQ
Qonverge, Qorivva, Engine, SMARTMOS, TurboLink, VortiQa and Xtrinsic are trademarks
of Freescale Semiconductor, Inc. All other product or service names are the property
of their respective owners. © 2011 Freescale Semiconductor, Inc.
• Motivation for implementing Cryptographic Services
Engine (CSE)
• Basic Cryptography implemented by CSE
• Basics of how CSE works and how it is integrated into
MPC564xB/C
• Automotive security use-cases
Freescale on Kaixin Weibo?
Tag yourself in photos Please use hashtag
and upload your own! #FTF2011#
Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, the Energy Efficient Solutions logo, mobileGT, , QorIQ, StarCore
and Symphony are trademarks of Freescale Semiconductor, Inc., Reg. . Pat. & Tm. Off. BeeKit, BeeStack, ColdFire+, , Flexis, is, MXC, Platform in a
TM 2 Package, Processor Expert, QorIQ Qonverge, Qorivva, Engine, SMARTMOS, TurboLink, VortiQa and Xtrinsic are trademarks of Freescale Semiconductor, Inc.
All other product or service names are the property of their respective owners. © 2011 Freescale Semiconductor, Inc.
• SHE - Secure Hardware Extension
− Is the functional specification for a peripheral module mainly
worked on by AUDI and BMW together with pany called
escrypt. It is now an official HIS Specification and is under
copyright of the AUDI AG and BMW AG ©, 2008.
. “The Secure Hardware Extension (SHE) is an on-chip extension to any
given microcontroller. It is intended to move the control over
cryptographic keys from the software domain into the hardware domain
and the