In the previous blog post, ā€œEmbedded Security Using Cryptographyā€, we looked at how cryptography can be used for securing assets in embedded systems and ensure confidentiality, integrity and ...