Xiphera and Crypto Quantique Announce Partnership for Quantum-Resilient Hardware Trust Engines
Combining Crypto Quantique’s PUF technology with Xiphera’s quantum-resilient cryptography provides future-proof hardware trust engines to protect devices and data for decades to come.
How to Secure Your Computing System’s Power-Up Process with Secure Boot?
A hardware-based secure boot can strengthen the integrity of a computing system during its power-up. How can we implement a secure boot in our devices, and what prerequisites are required?
Xiphera Announces Quantum-Resistant Secure Boot
The new Secure Boot for the nQrux® Hardware Trust Engines family uses a hybrid signature scheme, offering a fundamental building block for creating trust in computing systems.
Systems Designed Today Must Support Post-Quantum Cryptography Tomorrow
Post-Quantum Cryptography (PQC) will answer to the imminent threat created by advances in quantum computing. Xiphera will present and demonstrate hardware-based IP cores for PQC algorithms in Japan in September 2024.
Xiphera’s Customisable nQrux™ Confidential Computing Engine Protects Cloud, Edge, and AI Environments
nQrux™ CCE solution is customised to include various types of computing resources, while the communication of data and code is protected with hardware-based implementation of TLS 1.3.
Cryptographic Modules Provide Critical Security in a Unified and Isolated Hardware Solution
Cryptographic modules offer an all-inclusive cryptography package for customised security needs. This blog deep-dives into the benefits, implementations, and possible use cases of a hardware-based cryptographic module.
Xiphera Launches nQrux™ Family of Hardware Trust Engines for Hardware-Isolated Cryptographic Services and Computing Environments
The new nQrux™ portfolio offers highly optimised and customisable security solutions with cryptographic operations implemented purely in hardware.
Scalable Extreme-speed IPsec Added to Xiphera’s Security Protocols Portfolio
The IPsec IP core complements Xiphera’s Security Protocols offering, bringing proven security for the critical layers 2-4 of the OSI model.
What Is the OSI Model, and How Can We Protect Its Critical Layers?
The OSI model is the basis for most of the modern digital communications. Let’s dive into the seven layers of the OSI model and answers the billion-dollar question: how to protect the transmitted data throughout the OSI model?
Xiphera Releases High-Speed ECC Accelerator
The new IP core extends Xiphera’s offering for high-performance solutions and applications, providing both significant speed and comprehensive support of multiple elliptic curves.