In the previous blog post, โ€œEmbedded Security Using Cryptographyโ€, we looked at how cryptography can be used for securing assets in embedded systems and ensure confidentiality, integrity and ...