• April 26, 2018

    On the Path to a Secure Boot Solution for RISC-V

    As the RISC-V ISA gains in popularity and more industries proceed with plans to build and deploy systems based on [...]

  • April 2, 2018

    NIST Post-Quantum Cryptography Standardization Project

    Preparing for the Quantum Era: The Race to Secure Cryptography Quantum computing is rapidly transitioning from theoretical research to practical [...]

  • March 19, 2018

    Bloomberg: Most Connected Devices are Easy to Hack. This Company Says it Can Fix That.

    Most smart, connected devices are often easy to hack because they have low-power, low-resource processors, making current methods of security [...]

  • February 22, 2018

    SecureRF to Showcase Future-Proof Security Solutions for Low-Resource Processors at Embedded World 2018

    IoT developers looking for quantum-resistant authentication and data protection solutions for their embedded devices and processors will find the smallest [...]

  • February 12, 2018

    IoT Security News: Attacks, Encryption and WAP3

    The new year kicked off with major security-related news. On January 3, we learned that billions of CPUs are vulnerable [...]

  • February 6, 2018

    An Update on Spectre and Meltdown

    Computer owners, beware! In early January, we learned about two massive security flaws in most of the CPUs used in [...]

  • January 18, 2018

    Interview: Louis Parks on “Securing Our Future” with Peggy Smedley

    Louis Parks (CEO, SecureRF) recently appeared on The Peggy Smedley Show podcast (Episode 545). In a segment titled “Securing Our [...]

  • January 15, 2018

    SecureRF Solutions Named “Best Technology” for 2017 by The Linley Group

    2017 Best Technology Award SecureRF has received The Linley Group's 2017 Analysts' Choice Award for "Best Technology." Selected from a strong [...]

  • January 3, 2018

    NIST Accepts SecureRF’s WalnutDSA for Evaluation

    SecureRF's Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as [...]

  • January 1, 2018

    Group Theoretic Cryptography

    Our methods are based on Group Theoretic Cryptography (GTC), an area studied for more than 40 years, that has been used [...]