Weekly Highlights: Yangtze Memory Technologies Signs Agreement with Wuhan University; NAND Flash Price Trend Forecast; Shenzhen and Sichuan Introduce Semiconductor Policies

Weekly Highlights: Yangtze Memory Technologies Signs Agreement with Wuhan University; NAND Flash Price Trend Forecast; Shenzhen and Sichuan Introduce Semiconductor Policies

Semiconductor News Summary Yangtze Memory Technologies Signs Agreement with Wuhan University NAND Flash Price Trend Forecast Shenzhen and Sichuan Introduce Semiconductor Policies Yitang Semiconductor Goes Public Yangtze River Delta IC Industry Accounts for 3/5 of National Scale 1 Yangtze Memory Technologies Signs Agreement with Wuhan University On July 10, the School of Integrated Circuits at … Read more

Insight into NOR Flash: Industry Analysis

Insight into NOR Flash: Industry Analysis

1.Overview of the NOR Flash Industry (1) Overview of the Memory IndustryThe memory industry is divided into volatile memory (RAM) and non-volatile memory (NVM). RAM is typically used as temporary working memory, which is fast but loses data when power is off (volatile); NVM is used for permanent storage of data and programs, retaining data … Read more

Jianbo Micro AI RISC-V Server Encryption Chip: In-Depth Practice of Domestic Computing Power Security

Jianbo Micro AI RISC-V Server Encryption Chip: In-Depth Practice of Domestic Computing Power Security

Jianbo Micro AI RISC-V Server Encryption Chip: In-Depth Practice of Domestic Computing Power Security In today’s rapidly advancing technology landscape, computing power security has become an essential component of national technology strategy. At the beginning of 2025, a joint announcement by eight departments regarding the “Guidelines for Promoting RISC-V Chip Applications” has sparked a wave … Read more

ChaCha20 vs AES: When Cryptographic Algorithms Meet the Security Power of TLS 1.3

ChaCha20 vs AES: When Cryptographic Algorithms Meet the Security Power of TLS 1.3

Security is not additive, but subtractive—TLS 1.3 achieves this through a “minimalist” cipher suite, removing over 10 features (such as compression and renegotiation), and reducing the cipher suites from 37 to 5,AES-CBC was directly removed due to security risks. Meanwhile, the ChaCha20-Poly1305 algorithm has become the new favorite in the TLS protocol, gradually taking center … Read more

Data Encryption Techniques in Python: Common Encryption Algorithms and Their Implementation

Data Encryption Techniques in Python: Common Encryption Algorithms and Their Implementation

Data Encryption Techniques in Python: Common Encryption Algorithms and Their Implementation In today’s information age, data security is particularly important. Whether it is personal privacy or corporate secrets, protecting data from unauthorized access is crucial. This article will introduce several commonly used data encryption algorithms and demonstrate how to implement these algorithms using Python code … Read more

OW-CCA1 Security of the ElGamal Encryption Algorithm

OW-CCA1 Security of the ElGamal Encryption Algorithm

This issue, the editor shares an article from the EUROCRYPT 2024 conference chapter on Advanced Public-Key Encryption, authored by researchers from Eindhoven University of Technology. This article abstracts the ElGamal encryption algorithm as a primitive called RRR relations (random self-reducible relations) and concludes that it cannot be proven to be OW-CCA-1 secure in the standard … Read more

Understanding the SM2 Encryption Algorithm

Understanding the SM2 Encryption Algorithm

In the digital world, we exchange information every day: online shopping payments, WeChat chats, online office work, and even scanning codes to take the subway… Behind these conveniences lies an invisible “security guard”—encryption algorithms. You may have heard of international mainstream algorithms like RSA and ECC, but today, we will discuss a “guardian of security” … Read more

Comprehensive Analysis of the Python Standard Library hashlib Module Encryption Algorithms

Comprehensive Analysis of the Python Standard Library hashlib Module Encryption Algorithms

Comprehensive Analysis of the Python Standard Library hashlib Module Encryption Algorithms It was a Wednesday night I will never forget; all user passwords in the production environment suddenly became invalid. After troubleshooting for half a day, we finally discovered that the issue stemmed from a seemingly harmless MD5 encryption— the intern had directly stored plaintext … Read more

A Detailed Introduction to the RSA Asymmetric Encryption Algorithm: How It Works and Its Security

A Detailed Introduction to the RSA Asymmetric Encryption Algorithm: How It Works and Its Security

The RSA encryption algorithm is the most commonly used asymmetric encryption algorithm, proposed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. The name RSA is derived from the initials of their last names. It is the first relatively complete public key algorithm, which can be used for both encryption and digital signatures. This … Read more

Java Data Encryption: Practical Applications and Performance Optimization of AES and RSA Algorithms

Java Data Encryption: Practical Applications and Performance Optimization of AES and RSA Algorithms

Introduction In today’s digital age, data security has become one of the most severe challenges faced by enterprises and developers. Imagine your bank account information and personal privacy data as precious items placed in a transparent glass house, easily visible to anyone. This is why data encryption technology is so important—it acts like an invisibility … Read more