Maxim > 设计支持 > 技术文档 > 应用笔记

应用笔记

 应用笔记   设计指南   工程期刊   

  • 我们的工程师撰写了2000篇以上的应用笔记和技术文章,为其他工程师提供支持。
  • 这些文章包括专家的分析和设计思路,并提供有参考设计和设计指南,使您的设计更专业。
  • 浏览最新的应用笔记

    嵌入式安全方案


    View   In New Window PDF
    407kB
    应用笔记 7015 
    Back to Basics: Secure Hash Algorithms
    View   In New Window   应用笔记 6891 
    Secure Authentication for Medical Disposables
    View   In New Window PDF
    211.7kB
    应用笔记 6761 
    How to Protect IoT Devices Using a Software Isolation Solution
    View   In New Window PDF
    874.7kB
    应用笔记 6767 
    How ChipDNA Physically Unclonable Function Technology Protects Embedded Systems
    View   In New Window PDF
    711.5kB
    应用笔记 6799 
    How to Multiplex a 1-Wire Master into Numerous Channels
    View   In New Window PDF
    3.1MB
    应用笔记 6896 
    Why Now is a Good Time to Secure Your Embedded Systems with SHA-3
    View   In New Window PDF
    394.1kB
    应用笔记 6762 
    Fundamental Advantages of the MAXQ1061/MAXQ1062 Compared to Chips Based on the TPM 2.0 Standard
    View   In New Window   应用笔记 6465 
    How to Generate a DS28C36 Session Key
    View   In New Window PDF
    107.8kB
    应用笔记 6436 
    Using Secure Companion ICs to Protect a TLS Implementation
    View   In New Window   应用笔记 6435 
    How to Authenticate DS28C36 Data (User Memory/GPIO/Decrement Counter) with ECDSA
    View   In New Window   应用笔记 6434 
    How to Verify the DS28C36 ECDSA Certificate
    View   In New Window PDF
    516.2kB
    应用笔记 6426 
    The Fundamentals of Secure Boot and Secure Download: How to Protect Firmware and Data within Embedded Devices
    View   In New Window   应用笔记 6391 
    不是加密专家也可实现安全认证
    View   In New Window PDF
    500.4kB
    应用笔记 6004 
    Secure the IoT: Part 1, Public Key Cryptography Secures Connected Devices
    View   In New Window PDF
    534.4kB
    应用笔记 6005 
    Secure the IoT: Part 2, A Secure Boot, the "Root of Trust" for Embedded Devices
    View   In New Window PDF
    1.8MB
    应用笔记 5991 
    Realizing Industry 4.0: Essential System Considerations
    View   In New Window PDF
    1019.7kB
    应用笔记 6208 
    Extending I2C Communication Distance with the DS28E17
    View   In New Window PDF
    1.7MB
    应用笔记 5803 
    Secure Your FPGA System Using a DeepCover Secure Authenticator
    View   In New Window PDF
    1.1MB
    应用笔记 5940 
    Secure 3D Printing - the New Disruptive Technology - and Watch the Market Grow
    View   In New Window PDF
    841.8kB
    应用笔记 5932 
    Fundamentals of Electronic Security: What Does Security Really Mean?
    View   In New Window PDF
    681.6kB
    应用笔记 5937 
    Fundamentals of Electronic Security: Tampering with the Easy Targets
    View   In New Window   应用笔记 6046 
    ECDSA-Based Authentication Redefines the Secure Sensor Card
    View   In New Window PDF
    114kB
    应用笔记 5921 
    Designing an Antenna for MAX66300
    View   In New Window PDF
    1.6MB
    应用笔记 5913 
    Getting Started with the MAXQ622 Evaluation Kit
    View   In New Window PDF
    1MB
    应用笔记 5785 
    Implement Heightened Security with a SHA-256 Master/Slave Authentication System
    View   In New Window PDF
    1.6MB
    设计指南 5767 
    The Fundamentals of an ECDSA Authentication System
    View   In New Window PDF
    621.8kB
    应用笔记 5758 
    Analog Integration Drives Factory Integration
    View   In New Window PDF
    550.5kB
    Subsystem Board 5822 
    Alcatraz (MAXREFDES34#): SHA-256 Secure Authentication Design
    View   In New Window PDF
    540.7kB
    应用笔记 5779 
    Introduction to SHA-256 Master/Slave Authentication
    View   In New Window PDF
    86.8kB
    应用笔记 5696 
    Protect Your Designs from Malware with the DeepCover MAXQ1050 Secure Microcontroller
    View   In New Window PDF
    117kB
    设计指南 5716 
    Hardware Security ICs Offer Large Security Returns at a Low Cost
    View   In New Window   应用笔记 5546 
    The Fundamentals of a SHA-256 Master/Slave Authentication System
    View   In New Window   设计指南 5486 
    智能电网的安全设计
    View   In New Window PDF
    112.7kB
    设计指南 5518 
    Uptime Protects the Bottom Line
    View   In New Window PDF
    93.2kB
    应用笔记 5416 
    Ubiquity of NFC-Enabled Phones Leads to Strong Brand Protection
    View   In New Window PDF
    378.1kB
    应用笔记 5536 
    Energy Measurement and Security for the Smart Grid - Too Long Overlooked
    View   In New Window   应用笔记 5337 
    智能电表的安全保障
    View   In New Window PDF
    234.1kB
    应用笔记 5328 
    Transforming a Smartphone Design into a Sophisticated Point-of-Sale Terminal
    View   In New Window PDF
    106.9kB
    应用笔记 5524 
    Securing Critical Data with Hardware AES Engines
    View   In New Window PDF
    149.5kB
    设计指南 5445 
    Stuxnet and Other Things that Go Bump in the Night
    View   In New Window PDF
    91.7kB
    设计指南 5522 
    Industrial Systems Need the Added Protection of Security ICs
    View   In New Window PDF
    160.2kB
    应用笔记 5485 
    Understanding the DSSHA1 Synthesizable SHA-1 Coprocessor
    View   In New Window   应用笔记 5427 
    RSA-Key Generation Using the DeepCover Secure Microcontroller (MAXQ1050)
    View   In New Window PDF
    52.9kB
    应用笔记 5145 
    Modular-Exponentiation Timing with MAXQ30 Microcontrollers
    View   In New Window   应用笔记 5049 
    Using the DeepCover Security Manager (DS3645) Power-Management Mode
    View   In New Window   应用笔记 4728 
    Using Window Comparators in Secure Managers
    View   In New Window PDF
    569.7kB
    设计指南 4702 
    Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables
    View   In New Window   应用笔记 4594 
    防止FPGA设计被盗版:高性价比认证方案有效保护基于SRAM的FPGA设计IP
    View   In New Window   应用笔记 4478 
    如何应用基于SHA-1算法的安全认证和系统功能配置
    View   In New Window PDF
    32kB
    应用笔记 4623 
    Smart Cable Aids Quality Control and Authentication
    View   In New Window   应用笔记 4244 
    安全管理电路提供全方位监测,确保系统的安全性
    View   In New Window PDF
    88.9kB
    应用笔记 4297 
    Battery Selection for Security Manager Applications
    View   In New Window   应用笔记 4185 
    实现密钥的物理安全
    View   In New Window   应用笔记 3976 
    嵌入式安全系统的发展趋势
    View   In New Window   应用笔记 3989 
    通过单个触点增加控制、存储器、安全和混合信号功能
    View   In New Window   应用笔记 3826 
    利用1-Wire®接口的SHA-1安全存储器实现Xilinx® FPGA的识别及防拷贝机制
    View   In New Window   应用笔记 3675 
    利用安全认证保护您的研发成果
    View   In New Window   应用笔记 1098 
    白皮书3:为什么1-Wire SHA-1器件是安全的?
    View   In New Window   应用笔记 3522 
    白皮书9:SHA-1器件的安全性是否依然足够安全?
    View   In New Window   应用笔记 178 
    利用1-Wire®产品标识印刷电路板
    View   In New Window   设计指南 1201 
    白皮书8: 1-Wire® SHA-1概述
    View   In New Window PDF
    39kB
    应用笔记 1099 
    White Paper 4: Glossary of 1-Wire SHA-1 Terms
    View   In New Window PDF
    86.8kB
    应用笔记 505 
    Lithium Coin-Cell Batteries: Predicting an Application Lifetime
    View   In New Window PDF
    81kB
    应用笔记 190 
    Challenge and Response with 1-Wire® SHA Devices
    View   In New Window PDF
    41kB
    应用笔记 152 
    SHA iButton Secrets and Challenges
    View   In New Window PDF
    45kB
    应用笔记 150 
    Small Message Encryption using SHA Devices
    View   In New Window PDF
    184.6kB
    应用笔记 58 
    Crystal Considerations with Maxim Real-Time Clocks (RTCs)


    按型号选择

    输入型号的任何部分

    相关产品: 产品指南

    信息更新通知
    最先获得新出版的应用笔记,请订阅每周更新的EE-Mail™ – 应用笔记 (English only)。