• January 3, 2018

    NIST Accepts SecureRF’s WalnutDSA for Evaluation

    SecureRF's Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as [...]

  • December 21, 2017

    New Paper: Kayawood Key Agreement Protocol

    SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the [...]

  • May 8, 2017

    The Value of Data Protection in the Internet of Things

    The IoT is made up of billions of devices that collect and share data. If this data is not properly [...]

  • April 27, 2017

    Imminent Arrival of Quantum Computers Spells Danger for Private Data

    In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. [...]

  • April 24, 2017

    The Biggest IoT Security Threat: Failure of Imagination

    IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies [...]

  • March 30, 2017

    Sensor Security in Manufacturing and Construction IoT Applications

    Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. [...]

  • January 31, 2017

    Quantum-resistant Cryptography for the IoT

    Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved [...]

  • January 10, 2017

    Challenges of Cryptography for Low-Resource IoT Devices

    Key Takeaways Low-resource IoT devices face unique cryptographic challenges due to strict limits on power, processing, memory, and storage. Standard [...]

  • December 27, 2016

    Cryptography Basic for Chip Design Engineers

    The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part [...]

  • November 29, 2016

    Lightweight Cryptography for Embedded Systems in the IoT

    Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems [...]