Showing 49 - 56 of 92
Military & Aerospace Electronics

Trusted Computing and the Challenges of Cryptographic Algorithms in Quantum Computing

Quantum computing processes an algorithm by configuring quantum gates and initializing the qubits. Taking a measurement resolves the quantum states.

07/24/2019
Military & Aerospace Electronics

Trusted Computing Can Depend on Asymmetric Cryptography Algorithms to Assure the Integrity of Protected Data

Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.

06/26/2019
SAE MOBILUS

New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders

Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.

05/17/2019
MRO Business Today

The Kaleidoscope of Avionics @Curtiss-Wright

Swati Ketkar @ MRO Business Today interviews Chris Thomson of Curtiss-Wright about how predictive maintenance is changing the world of avionics.

05/03/2019
Military & Aerospace Electronics

Cryptography in Trusted Computing: an Introduction to Secure Hashing

Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.

04/24/2019
Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC

Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC

Green Hills Software’s field-proven INTEGRITY-178 tuMP safety- and security-critical multi-core real-time operating system (RTOS) will be demonstrated for the first time running on the Curtiss-Wright VPX3-1703.

04/15/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019
Military & Aerospace Electronics

Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft

If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.

02/27/2019