Skip to content
About us
Products
Close Products
Open Products
Overview
Catalogue
Security solutions
nQrux® Hardware Trust Engines
Crypto Module
Confidential Computing Engine
Secure Boot
Security Protocols
MACsec
IPsec
TLS 1.3
Extreme-Speed Solutions
Encrypted Network Accelerator Solutions
Cryptographic primitives
xQlave® Post-Quantum Cryptography
ML-KEM (Kyber)
ML-DSA (Dilithium)
Symmetric Encryption
AES-GCM
AES-CTR
Versatile AES
AES-XTS
ChaCha20-Poly1305
Ascon
Asymmetric Cryptography
ECDH/ECDSA: NIST Curves
Curve25519
RSA Signature Verification
Hash Functions
SHA-3
SHA-2 / HMAC and HKDF
Random Number Generation
True Random Number Generation
Pseudorandom Number Generation
Services
Close Services
Open Services
Design services
Trainings
Partners
Close Partners
Open Partners
Partners overview
Sales network
Insights
Close Insights
Open Insights
Newsroom
Webinars
White papers
Careers
Contact