Maxim > Design Support > Technical Documents > Application Notes

Application Notes

 Application Notes   Tutorials   Engineering Journals   

  • Over 2000 application notes and technical articles written by engineers, for engineers.
  • These articles offer experienced analysis, design ideas, reference designs, and tutorials—to make you an expert.
  • List of latest application notes.

    Embedded Security


    View   In New Window PDF
    407kB
    Application Note 7015 
    Back to Basics: Secure Hash Algorithms
    View   In New Window   Application Note 6891 
    Secure Authentication for Medical Disposables
    View   In New Window PDF
    211.7kB
    Application Note 6761 
    How to Protect IoT Devices Using a Software Isolation Solution
    View   In New Window PDF
    874.7kB
    Application Note 6767 
    How ChipDNA Physically Unclonable Function Technology Protects Embedded Systems
    View   In New Window PDF
    711.5kB
    Application Note 6799 
    How to Multiplex a 1-Wire Master into Numerous Channels
    View   In New Window PDF
    3.1MB
    Application Note 6896 
    Why Now is a Good Time to Secure Your Embedded Systems with SHA-3
    View   In New Window PDF
    394.1kB
    Application Note 6762 
    Fundamental Advantages of the MAXQ1061/MAXQ1062 Compared to Chips Based on the TPM 2.0 Standard
    View   In New Window   Application Note 6465 
    How to Generate a DS28C36 Session Key
    View   In New Window PDF
    107.8kB
    Application Note 6436 
    Using Secure Companion ICs to Protect a TLS Implementation
    View   In New Window   Application Note 6435 
    How to Authenticate DS28C36 Data (User Memory/GPIO/Decrement Counter) with ECDSA
    View   In New Window   Application Note 6434 
    How to Verify the DS28C36 ECDSA Certificate
    View   In New Window PDF
    516.2kB
    Application Note 6426 
    The Fundamentals of Secure Boot and Secure Download: How to Protect Firmware and Data within Embedded Devices
    View   In New Window PDF
    236.3kB
    Application Note 6391 
    Implementing Secure Authentication Without Being a Cryptography Expert
    View   In New Window PDF
    500.4kB
    Application Note 6004 
    Secure the IoT: Part 1, Public Key Cryptography Secures Connected Devices
    View   In New Window PDF
    534.4kB
    Application Note 6005 
    Secure the IoT: Part 2, A Secure Boot, the "Root of Trust" for Embedded Devices
    View   In New Window PDF
    1.8MB
    Application Note 5991 
    Realizing Industry 4.0: Essential System Considerations
    View   In New Window PDF
    1019.7kB
    Application Note 6208 
    Extending I2C Communication Distance with the DS28E17
    View   In New Window PDF
    1.7MB
    Application Note 5803 
    Secure Your FPGA System Using a DeepCover Secure Authenticator
    View   In New Window PDF
    1.1MB
    Application Note 5940 
    Secure 3D Printing - the New Disruptive Technology - and Watch the Market Grow
    View   In New Window PDF
    841.8kB
    Application Note 5932 
    Fundamentals of Electronic Security: What Does Security Really Mean?
    View   In New Window PDF
    681.6kB
    Application Note 5937 
    Fundamentals of Electronic Security: Tampering with the Easy Targets
    View   In New Window   Application Note 6046 
    ECDSA-Based Authentication Redefines the Secure Sensor Card
    View   In New Window PDF
    114kB
    Application Note 5921 
    Designing an Antenna for MAX66300
    View   In New Window PDF
    1.6MB
    Application Note 5913 
    Getting Started with the MAXQ622 Evaluation Kit
    View   In New Window PDF
    1MB
    Application Note 5785 
    Implement Heightened Security with a SHA-256 Master/Slave Authentication System
    View   In New Window PDF
    1.6MB
    Tutorial 5767 
    The Fundamentals of an ECDSA Authentication System
    View   In New Window PDF
    621.8kB
    Application Note 5758 
    Analog Integration Drives Factory Integration
    View   In New Window PDF
    550.5kB
    Subsystem Board 5822 
    Alcatraz (MAXREFDES34#): SHA-256 Secure Authentication Design
    View   In New Window PDF
    540.7kB
    Application Note 5779 
    Introduction to SHA-256 Master/Slave Authentication
    View   In New Window PDF
    86.8kB
    Application Note 5696 
    Protect Your Designs from Malware with the DeepCover MAXQ1050 Secure Microcontroller
    View   In New Window PDF
    117kB
    Tutorial 5716 
    Hardware Security ICs Offer Large Security Returns at a Low Cost
    View   In New Window   Application Note 5546 
    The Fundamentals of a SHA-256 Master/Slave Authentication System
    View   In New Window PDF
    112.7kB
    Tutorial 5518 
    Uptime Protects the Bottom Line
    View   In New Window PDF
    93.2kB
    Application Note 5416 
    Ubiquity of NFC-Enabled Phones Leads to Strong Brand Protection
    View   In New Window PDF
    378.1kB
    Application Note 5536 
    Energy Measurement and Security for the Smart Grid - Too Long Overlooked
    View   In New Window PDF
    234.1kB
    Application Note 5328 
    Transforming a Smartphone Design into a Sophisticated Point-of-Sale Terminal
    View   In New Window PDF
    106.9kB
    Application Note 5524 
    Securing Critical Data with Hardware AES Engines
    View   In New Window PDF
    149.5kB
    Tutorial 5445 
    Stuxnet and Other Things that Go Bump in the Night
    View   In New Window PDF
    116.7kB
    Tutorial 5486 
    Securing the Life Cycle in the Smart Grid
    View   In New Window PDF
    91.7kB
    Tutorial 5522 
    Industrial Systems Need the Added Protection of Security ICs
    View   In New Window PDF
    221kB
    Application Note 3675 
    Protect Your R&D Investment with Secure Authentication
    View   In New Window PDF
    160.2kB
    Application Note 5485 
    Understanding the DSSHA1 Synthesizable SHA-1 Coprocessor
    View   In New Window   Application Note 5427 
    RSA-Key Generation Using the DeepCover Secure Microcontroller (MAXQ1050)
    View   In New Window PDF
    81.1kB
    Application Note 5337 
    Securing the Smart Meter
    View   In New Window PDF
    52.9kB
    Application Note 5145 
    Modular-Exponentiation Timing with MAXQ30 Microcontrollers
    View   In New Window   Application Note 5049 
    Using the DeepCover Security Manager (DS3645) Power-Management Mode
    View   In New Window   Application Note 4728 
    Using Window Comparators in Secure Managers
    View   In New Window PDF
    569.7kB
    Tutorial 4702 
    Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables
    View   In New Window PDF
    228.3kB
    Application Note 178 
    Printed Circuit Board Identification Using 1-Wire® Products
    View   In New Window PDF
    32kB
    Application Note 4623 
    Smart Cable Aids Quality Control and Authentication
    View   In New Window PDF
    124kB
    Application Note 4594 
    Protect Your FPGA Against Piracy: Cost-Effective Authentication Scheme Protects IP in SRAM-Based FPGA Designs
    View   In New Window   Application Note 4478 
    How to Implement SHA-1 Based Secure Authentication and System Feature Settings
    View   In New Window PDF
    88.9kB
    Application Note 4297 
    Battery Selection for Security Manager Applications
    View   In New Window PDF
    57.2kB
    Application Note 4244 
    Secure Managers Provide Multifaceted Monitoring to Ensure System Security
    View   In New Window PDF
    150kB
    Application Note 4185 
    Addressing the Physical Security of Encryption Keys
    View   In New Window PDF
    524.8kB
    Application Note 3989 
    Add Control, Memory, Security, and Mixed-Signal Functions with a Single Contact
    View   In New Window PDF
    71.5kB
    Application Note 3976 
    Embedded Security Going Forward
    View   In New Window PDF
    51kB
    Application Note 3826 
    Xilinx® FPGA IFF Copy Protection with 1-Wire® SHA-1 Secure Memories
    View   In New Window PDF
    32kB
    Application Note 3522 
    White Paper 9: Are SHA-1 Devices Still Secure Enough?
    View   In New Window PDF
    212.2kB
    Tutorial 1201 
    White Paper 8: 1-Wire® SHA-1 Overview
    View   In New Window PDF
    40kB
    Application Note 1098 
    White Paper 3: Why are 1-Wire SHA-1 Devices Secure?
    View   In New Window PDF
    39kB
    Application Note 1099 
    White Paper 4: Glossary of 1-Wire SHA-1 Terms
    View   In New Window PDF
    86.8kB
    Application Note 505 
    Lithium Coin-Cell Batteries: Predicting an Application Lifetime
    View   In New Window PDF
    81kB
    Application Note 190 
    Challenge and Response with 1-Wire® SHA Devices
    View   In New Window PDF
    41kB
    Application Note 152 
    SHA iButton Secrets and Challenges
    View   In New Window PDF
    45kB
    Application Note 150 
    Small Message Encryption using SHA Devices
    View   In New Window PDF
    184.6kB
    Application Note 58 
    Crystal Considerations with Maxim Real-Time Clocks (RTCs)


    Search by part number

    Enter any portion of part number(s)

    Also see: Product Guides

    Keep Me Informed
    Preview new application notes in your areas of interest as soon as they are published. Subscribe to EE-Mail™ - Application Notes for weekly updates.