Authentication
Looking back at the 4th RISC-V Workshop; musings on the meaning of a new processor and Instruction Set Architecture, and security for IoT.
A main focus for us at SecureRF is the Internet of Things (IoT) and how to secure devices, data and communications at the edge of the IoT that rely on relatively low-power 8- and 16-bit processors. The availability of a lower-cost and efficient RISC processor for IoT devices offers new opportunities to design engineers they…
Read MoreSecureRF to Present Quantum-Resistant IoT Security Application at 4th RISC-V Workshop and Offer Digital Signature and Key Agreement Software Evaluation Kit
SecureRF will be presenting RISC-V as a Basis for ASIP Design: A Quantum-Resistant IoT Security Implementation detailing the development of a RISC-V compliant processor, built with Codasip tools, that includes an IoT security application at the RISC-V Workshop to be hosted by MIT, July 12-13, 2016. The presentation will focus on SecureRF’s WalnutDSATM, a digital…
Read MoreSecureRF Announces Multi-Mode Sensor LIME Tag for the IoT, and an Update to its Credentialing Solution
New MY01 LIME Tag provides integrated Cellular, Bluetooth Low Energy (BLE), classic Bluetooth, and Near Field Communication (NFC) connectivity on single platform with security and sensors MY01 utilizes Public-Key Infrastructure (PKI) for identification, authentication and symmetric security for on-tag data protection Integrates with Veridify Internet of Things (IoT) cloud-based platform for real-time visibility and monitoring…
Read MoreSecureRF Announces Veridify, a Cloud based Platform and Application Suite Delivering Public Key Infrastructure to Tags and Devices in the IoT
SecureRF announces the availability of Veridify, a cloud based platform delivering Public Key Infrastructure for devices, sensors and tags in the IoT. Veridify includes PC, reader, and smartphone Apps featuring strong identification, authentication, and data protection that enable the rapid deployment of innovative solutions for low resources things including tags, smartcards, wireless sensors, and embedded…
Read MoreSecureRF CEO, Louis Parks Talks Security Solutions in the IoT with IDTechEx
IDTechEx interviewed SecureRF CEO, Louis Parks at the Sensors USA and Internet of Things Applications USA conferences.They discussed security and privacy solutions for the smallest devices on the Internet of Things including wireless sensors (Bluetooth LE/Smart), ARM Cortex M0/M0+/M3/M4 processors, FPGAs, ASICs, SoCs, NFC, RFID, and MCUs. Watch Video
Read MoreSecureRF Establishes Presence in Silicon Valley
In response to the growth of our customer base in the semiconductor, software and systems communities, we announced the opening of our new office in Silicon Valley. This West Coast Regional Office will develop and deliver security solutions in support of existing and future semiconductor partnerships. With security and privacy becoming vital factors for market…
Read MoreSecureRF CEO discusses security, IoT, SBIR and hockey in CTStartup Podcast
Our CEO, Louis Parks, was interviewed for a podcast by CTStartup. This was recorded at the CT Innovation Summit which was put on by the Connecticut Technology Council. Their discussion starts with some explanations about security, which Louis clarifies is more than just encryption and can include authentication and non-repudiation. They discuss various IoT hacking…
Read MoreSecureRF to Partner with University of Buffalo under NSF Grant
The National Science Foundation has awarded the University at Buffalo mathematics department a three-year, $600,000 grant to support the new program Experiential Diversity in Graduate Education (EDGE@UB). Led by mathematics professor and director of graduate studies William Menasco, the initiative is a collaboration with industry and academic partners including IBM’s Buffalo Innovation Center, M&T Bank,…
Read MoreCryptanalysis of the Algebraic Eraser Diffie-Hellman key agreement protocol by Ben-Zvi-Blackburn-Tsaban
Analysis of cryptographic methods is a regular event, and it helps to identify areas requiring further research and possible improvement, weak keys or parameters, and in some very rare cases an actual weakness in a method (see SHA-1 research). We encourage reviews and analysis of our methods and make direct requests at conferences we attend…
Read MoreSecureRF Discussing Security for IoT Devices at Three Events in Early October 2015
The Internet of Things (IoT) is a hot topic right now and one of the largest concerns is around security. SecureRF will discuss how we are securing the Internet of Things at three different types of events in early October: a semiconductor’s forum on security, a trade association summit and an academic workshop on cryptography.…
Read More