www.design-reuse-embedded.com
   Founded in 2004, Veridify Security, formerly SecureRF, develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things (IoT). Our authentication and data protection solutions are highly efficient when compared to techniques like ECC and RSA. We deliver ultra-low-energy, fast, and small footprint solutions ideally suited for 32-bit, 16-bit, and even 8-bit devices like the ARM Cortex M0/M3 and RISC-V processors. Our security solutions are used to address wireless sensors, NFC, Bluetooth, and RFID tags as well as embedded platforms including FPGAs, microcontrollers, and ASICs. Software Development Kits, RTL, and tools are available for a wide range of environments.   
6 SoCs

1
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed.

2
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices.

3
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diffie–Hellman-like Key Agreement Protocol (KAP)...

4
Robust Embedded Security Solutions for Industrial Applications
One of the most critical requirements for industrial IoT applications is to provide security for devices that must be controlled remotely.

5
Small and Fast Security Solutions for Critical Automotive Applications
Today's vehicles are equipped with multiple microcontrollers that control critical safety and performance functions in a vehicle.

6
Walnut DSA (TM) Fast, Future-Proof Digital Signature Algorithm Designed for Low-Resource Devices
WalnutDSA™ is a fast, small footprint, future-proof, public-key digital signature solution for low-resource devices–running on 8-, 16-, and 32-bit processors–that power the Internet ...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.