Jump to main content
SHA104-TFLXAUTH CryptoAuthentication™ Data Sheet
Search
Product Pages
SHA104
SHA104-TFLXAUTH
Home
3
Security Information
3.2
Key Uses and Restrictions
Introduction
Features
Use Cases
Pin Configuration and Pinouts
1
Overview
2
EEPROM Memory
3
Security Information
3.1
Cryptographic Standards
3.2
Key Uses and Restrictions
3.2.1
Symmetric Keys
3.2.2
Monotonic Counter
3.3
Security Features
4
I/O Interfaces
5
Electrical Characteristics
6
Command Descriptions
7
Application Information
8
Package Marking Information
9
Package Drawings
10
Revision History SHA104
11
Product Identification System
Microchip Information
3.2 Key Uses and Restrictions