31.2 Features

  • Address scrambling to the RAM
  • Data scrambling to/from the RAM
  • Silent access of data
  • Data remanence prevention
  • Active shielding to prevent tamper on physical RAM
  • Full erasure of scramble key and RAM data on tamper detection