Jump to main content
SHA105-TFLXAUTH CryptoAuthentication™ Data Sheet
Search
Product Pages
SHA105
Home
3
Security Information
Introduction
Features
Use Cases
Pin Configuration and Pinouts
1
Overview
2
EEPROM Memory
3
Security Information
3.1
Cryptographic Standards
3.2
Key Uses and Restrictions
3.3
Security Features
4
I/O Interfaces
5
Electrical Characteristics
6
Command Descriptions
7
Application Information
8
Package Marking Information
9
Package Drawings
10
Revision History SHA105
11
Product Identification System
Microchip Information
3 Security Information