Are you interested in using our solutions and tools to secure low-resource processors and embedded devices? From this page, you can access FAQ's, essential technical documentation, sample applications, and files that will help you implement our authentication, identification and data protection solutions.
Want to learn more about security, Veridify's methods and how they are used. This list of Frequently Asked Questions may have the answers. Learn More
Want to learn more about Veridify’s quantum-resistant cryptography methods? Read through our technical papers and white papers. Learn More
Veridify provides developers with a variety of resources for implementing our security solutions with our partners’ technologies, such as the Arrow Chameleon96 Community Board and the Intel DE10-Nano Board. Visit our Developer Resources page for more information.
Veridify’s mathematician-cryptographers, developers, and engineers are thought leaders in their fields. We maintain a library of presentations and webinars on a wide variety of topics, including Veridify technologies, cryptography, mathematics, embedded systems, and IoT security. Learn More
The IoT Embedded Security Development Kit enables you to use Veridify’s quantum-resistant, low resource Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices. The SDK includes:
- Usage documentation
- IDE project and configuration files
- Object code library
- Sample code
- Sample keys, certificate, and digital signatures.
Request a Free SDK
The IoT Embedded Security Development Kit enables you to use Veridify’s quantum-resistant, low-resource Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices.