Comprehensive Overview of ROM, RAM, and FLASH

Comprehensive Overview of ROM, RAM, and FLASH

Source: Technology Makes Dreams Greater Compiled by: Li Xiaoyao A few days ago, I happened to discuss some knowledge about ROM, RAM, and FLASH with my colleagues. Suddenly, when we talked about these English terms, we realized our understanding was quite superficial. Among us, the meanings of some MCU terms were also unclear, so tonight … Read more

What Are the Patterns of Government-Promoted Storage Chips?

What Are the Patterns of Government-Promoted Storage Chips?

Source: The World of Photolithography Storage is born alongside data; wherever there is data, there will be a need for storage chips. Moreover, with the development of emerging industries such as big data and the Internet of Things, the storage industry is closely related to information security. The total global output value of storage chips … Read more

Analysis of the Current State of Chinese Chips

Analysis of the Current State of Chinese Chips

In the entire semiconductor industry chain, there is a significant gap in areas such as EDA, manufacturing, and key equipment like photolithography machines compared to the world’s advanced levels; in terms of design, the gap in mobile processors is relatively small compared to international standards, while desktop CPUs and GPUs show a clear gap, and … Read more

How to Solve These Problems with Nor Flash?

How to Solve These Problems with Nor Flash?

Source: Semiconductor Industry Observation In the past year, the soaring prices and promising prospects of Nor Flash have reignited confidence in encoded storage devices. Many manufacturers, including Gigadevice and Winbond, have made significant profits from this trend. While some may view this somewhat outdated product as lacking in technical content, Nor Flash faces various challenges … Read more

Flash Memory Technology Overview

Flash Memory Technology Overview

Source: Semi Connect Author: Belle Flash Memory, also known as Flash, is a type of non-volatile memory that represents data using the threshold levels of storage cells. The main technology used in Flash memory cells is the Floating Gate field-effect transistor (see Figure 5-80). The charge on the floating gate determines the threshold of the … Read more

The Development History of Memory: DRAM, NAND Flash, and Nor Flash

The Development History of Memory: DRAM, NAND Flash, and Nor Flash

Introduction:NOR Flash and NAND Flash are the two major segments of storage (along with DRAM), and their development has always been a focus of industry professionals. Edited by Carol Source: Compiled from the Internet Reprint must indicate the source: Chip Master Recently, the General Administration of Quality Supervision, Inspection and Quarantine and the National Standardization … Read more

Course Notes: Theory and Construction of Fully Homomorphic Encryption – Part One

Course Notes: Theory and Construction of Fully Homomorphic Encryption - Part One

Introduction: This article is the course notes from the afternoon session of the Fully Homomorphic Encryption summer class. The afternoon course was taught by Professor Xie Xiang, titled “Theory and Construction of Fully Homomorphic Encryption.” Professor Xie is a researcher at Shanghai Qi-Zhi Institute, primarily engaged in the research and implementation of efficient and secure … Read more

What Is Encryption? From Caesar to Enigma Machine

What Is Encryption? From Caesar to Enigma Machine

This article is an excerpt from a book produced by Zhihu: “Cats, Einstein, and Cryptography: Quantum Communication That I Can Understand” From Julius Caesar to Sherlock Holmes from Nazi leader Hitler to the father of AI, Turing… How did the ultimate code in the field of communication come into being? All of this must start … Read more

Why Did Google Crack the SHA-1 Algorithm?

Why Did Google Crack the SHA-1 Algorithm?

A few days ago, the news of Google cracking the SHA-1 algorithm flooded my social media feed. In fact, the term “crack” is not entirely accurate, it should be that they published an example of breaking the SHA-1 algorithm. Regarding this news, I saw two different comments: A: Wow, that’s amazing! They actually cracked an … Read more

How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more