April 26, 2018
On the Path to a Secure Boot Solution for RISC-V
As the RISC-V ISA gains in popularity and more industries proceed with plans to build and deploy systems based on [...]
April 2, 2018
NIST Post-Quantum Cryptography Standardization Project
Preparing for the Quantum Era: The Race to Secure Cryptography Quantum computing is rapidly transitioning from theoretical research to practical [...]
March 19, 2018
Bloomberg: Most Connected Devices are Easy to Hack. This Company Says it Can Fix That.
Most smart, connected devices are often easy to hack because they have low-power, low-resource processors, making current methods of security [...]
February 22, 2018
SecureRF to Showcase Future-Proof Security Solutions for Low-Resource Processors at Embedded World 2018
IoT developers looking for quantum-resistant authentication and data protection solutions for their embedded devices and processors will find the smallest [...]
February 12, 2018
IoT Security News: Attacks, Encryption and WAP3
The new year kicked off with major security-related news. On January 3, we learned that billions of CPUs are vulnerable [...]
February 6, 2018
An Update on Spectre and Meltdown
Computer owners, beware! In early January, we learned about two massive security flaws in most of the CPUs used in [...]
January 18, 2018
Interview: Louis Parks on “Securing Our Future” with Peggy Smedley
Louis Parks (CEO, SecureRF) recently appeared on The Peggy Smedley Show podcast (Episode 545). In a segment titled “Securing Our [...]
January 15, 2018
SecureRF Solutions Named “Best Technology” for 2017 by The Linley Group
2017 Best Technology Award SecureRF has received The Linley Group's 2017 Analysts' Choice Award for "Best Technology." Selected from a strong [...]
January 3, 2018
NIST Accepts SecureRF’s WalnutDSA for Evaluation
SecureRF's Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as [...]
January 1, 2018
Group Theoretic Cryptography
Our methods are based on Group Theoretic Cryptography (GTC), an area studied for more than 40 years, that has been used [...]

