Systems Designed Today Must Support Post-Quantum Cryptography Tomorrow
![Post-Quantum Crpyography, or PQC, are algorithms implemented on traditional computational platforms, withstanding both traditional and quantum attacks.](https://xiphera.com/wp-content/uploads/post-quantum.jpg)
Post-Quantum Cryptography (PQC) will answer to the imminent threat created by advances in quantum computing. Xiphera will present and demonstrate hardware-based IP cores for PQC algorithms in Japan in September 2024.
Xiphera’s Customisable nQrux™ Confidential Computing Engine Protects Cloud, Edge, and AI Environments
![Xiphera’s nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures.](https://xiphera.com/wp-content/uploads/nqrux_web_2-1024x576.jpg)
nQrux™ CCE solution is customised to include various types of computing resources, while the communication of data and code is protected with hardware-based implementation of TLS 1.3.
Cryptographic Modules Provide Critical Security in a Unified and Isolated Hardware Solution
![Xiphera’s nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures.](https://xiphera.com/wp-content/uploads/nqrux_web_2-1024x576.jpg)
Cryptographic modules offer an all-inclusive cryptography package for customised security needs. This blog deep-dives into the benefits, implementations, and possible use cases of a hardware-based cryptographic module.
Xiphera Launches nQrux™ Family of Hardware Trust Engines for Hardware-Isolated Cryptographic Services and Computing Environments
![Xiphera’s nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures.](https://xiphera.com/wp-content/uploads/nqrux_web_2-1024x576.jpg)
The new nQrux™ portfolio offers highly optimised and customisable security solutions with cryptographic operations implemented purely in hardware.
Scalable Extreme-speed IPsec Added to Xiphera’s Security Protocols Portfolio
![Xiphera’s cryptographic Security Protocols secure point-to-point communication as well as server-client connections over the Internet.](https://xiphera.com/wp-content/uploads/2023/09/xiphera-security-protocols-min-1024x648.jpg)
The IPsec IP core complements Xiphera’s Security Protocols offering, bringing proven security for the critical layers 2-4 of the OSI model.
What Is the OSI Model, and How Can We Protect Its Critical Layers?
![](https://xiphera.com/wp-content/uploads/valokuva5-blue.jpg)
The OSI model is the basis for most of the modern digital communications. Let’s dive into the seven layers of the OSI model and answers the billion-dollar question: how to protect the transmitted data throughout the OSI model?
Xiphera Releases High-Speed ECC Accelerator
![](https://xiphera.com/wp-content/uploads/2023/09/xiphera-asymmetric-encryption-min-1024x683.jpg)
The new IP core extends Xiphera’s offering for high-performance solutions and applications, providing both significant speed and comprehensive support of multiple elliptic curves.
Xiphera Announces Support for Extreme-Speed IPsec
![Xiphera’s cryptographic Security Protocols secure point-to-point communication as well as server-client connections over the Internet.](https://xiphera.com/wp-content/uploads/2023/09/xiphera-security-protocols-min-1024x648.jpg)
Xiphera’s Security Protocols solution family covers all of the most critical communication layers for hardware-based security.
Xiphera’s Crypto Module Offers Customisable Offload and Acceleration Solutions
![Xiphera offers cryptographic IP cores for FPGA and ASIC technologies.](https://xiphera.com/wp-content/uploads/xiphera-products.jpg)
The Crypto Module is a versatile and multi-purpose solution for a wide range of security needs. It enables a comprehensive approach to cryptography offloading and security enhancement.
Xiphera Announces a New Batch of CAVP Validated IP Cores
![Xiphera's eight cryptographic IP cores have received a CAVP validation from NIST.](https://xiphera.com/wp-content/uploads/2023/09/xiphera-cavp-article.jpg)
“The IP cores in this CAVP batch are used in various applications and protocols, and are critical to be validated by a well-established third party”.