January 3, 2018
NIST Accepts SecureRF’s WalnutDSA for Evaluation
SecureRF's Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as [...]
December 21, 2017
New Paper: Kayawood Key Agreement Protocol
SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the [...]
May 8, 2017
The Value of Data Protection in the Internet of Things
The IoT is made up of billions of devices that collect and share data. If this data is not properly [...]
April 27, 2017
Imminent Arrival of Quantum Computers Spells Danger for Private Data
In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. [...]
April 24, 2017
The Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies [...]
March 30, 2017
Sensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. [...]
January 31, 2017
Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved [...]
January 10, 2017
Challenges of Cryptography for Low-Resource IoT Devices
Key Takeaways Low-resource IoT devices face unique cryptographic challenges due to strict limits on power, processing, memory, and storage. Standard [...]
December 27, 2016
Cryptography Basic for Chip Design Engineers
The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part [...]
November 29, 2016
Lightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems [...]

