Stories and Paper
Explore our Use Cases, Success Stories, and Research Paper
                 
                
            Search results
            
        All
            
                Use Cases & Success Stories
            
                Solution Briefs
            
                Factsheets
            
                Whitepapers
            
                Research Papers
            
        
                        Use Cases & Success Stories (4)
                    
                    View All
                 Schleupen
                                Ensuring Secure Energy Transition: Schleupen and Securosys' Collaboration on Smart Meter PKI
                                
                                    Read
	
                                
                            
                            
                                Schleupen
                                Ensuring Secure Energy Transition: Schleupen and Securosys' Collaboration on Smart Meter PKI
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Crypto Storage AG
                                Revolutionizing Secure Blockchain Asset Management with Crypto Storage AG
                                
                                    Read
	
                                
                            
                            
                                Crypto Storage AG
                                Revolutionizing Secure Blockchain Asset Management with Crypto Storage AG
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 KORE Technologies
                                KORE Technologies and Securosys: Building a Secure, End-to-End Digital Asset Management Platform
                                
                                    Read
	
                                
                            
                            
                                KORE Technologies
                                KORE Technologies and Securosys: Building a Secure, End-to-End Digital Asset Management Platform
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 SIX Interbank Clearing AG
                                Securosys HSMs Secure Swiss Payment Transactions for Another 10 Years
                                
                                    Read
	
                                
                            
                            
                                SIX Interbank Clearing AG
                                Securosys HSMs Secure Swiss Payment Transactions for Another 10 Years
                                
                                    Read
                                
                            
                        
                    
                Load more
                
                        Solution Briefs (8)
                    
                    View All
                 Keyfactor EJBCA/Signserver
                                Securosys and Keyfactor offer a REST API-based integration that seamlessly connects Securosys Primus HSMs with Keyfactor EJBCA and SignServer.
                                
                                    Read
	
                                
                            
                            
                                Keyfactor EJBCA/Signserver
                                Securosys and Keyfactor offer a REST API-based integration that seamlessly connects Securosys Primus HSMs with Keyfactor EJBCA and SignServer.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Fortinet FortiGate
                                Enhanced security for FortiGate SSL/TLS Inspection withSecurosys Primus HSM on-premises or in the cloud
                                
                                    Read
	
                                
                            
                            
                                Fortinet FortiGate
                                Enhanced security for FortiGate SSL/TLS Inspection withSecurosys Primus HSM on-premises or in the cloud
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Transaction Security Broker for Crypto Assets
                                This workflow engine combined with other capabilities of Securosys Hardware Security Modules, provides protection superior to that of the traditional Multi-signature or secure Multi-Party Computation.
                                
                                    Read
	
                                
                            
                            
                                Transaction Security Broker for Crypto Assets
                                This workflow engine combined with other capabilities of Securosys Hardware Security Modules, provides protection superior to that of the traditional Multi-signature or secure Multi-Party Computation.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Security Microsoft PKI Deployment 
                                based on Microsoft  Active Directory Certificate Services (AD CS)
                                
                                    Read
	
                                
                            
                            
                                Security Microsoft PKI Deployment 
                                based on Microsoft  Active Directory Certificate Services (AD CS)
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
	
		 Decanus Terminal
                                Remote Administration of Primus HSM and user partitions with Decanus Terminal
                                
                                    Read
	
                                
                            
                            
                                Decanus Terminal
                                Remote Administration of Primus HSM and user partitions with Decanus Terminal
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Decanus Terminal with CloudHSM
                                Take control of your CloudsHSM partition
                                
                                    Read
	
                                
                            
                            
                                Decanus Terminal with CloudHSM
                                Take control of your CloudsHSM partition
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
	
		 Key Attestation
                                Trusted and scalable verification of keys and timestamps
                                
                                    Read
	
                                
                            
                            
                                Key Attestation
                                Trusted and scalable verification of keys and timestamps
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Transaction Security Broker for Fintech
                                
                                
                                    Read
	
                                
                            
                            
                                Transaction Security Broker for Fintech
                                
                                
                                    Read
                                
                            
                        
                    
                Load more
                
                        Factsheets (6)
                    
                    View All
                 CloudHSM
                                Get the best of Securosys Primus HSM, directly from the Cloud.
                                
                                    Read
	
                                
                            
                            
                                CloudHSM
                                Get the best of Securosys Primus HSM, directly from the Cloud.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Primus HSM X CyberVault
                                The Hardware Security Module that combinesperformance and cyber security innovation
                                
                                    Read
	
                                
                            
                            
                                Primus HSM X CyberVault
                                The Hardware Security Module that combinesperformance and cyber security innovation
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Primus HSM X-Series
                                Secure, Reliable, and Scalable Hardware Security Modules
                                
                                    Read
	
                                
                            
                            
                                Primus HSM X-Series
                                Secure, Reliable, and Scalable Hardware Security Modules
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Primus HSM E-Series
                                Enterprise level Hardware Security Module at an unbeatable performance/price ratio
                                
                                    Read
	
                                
                            
                            
                                Primus HSM E-Series
                                Enterprise level Hardware Security Module at an unbeatable performance/price ratio
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Decanus Terminal
                                Remote management of your HSM and user partition
                                
                                    Read
	
                                
                            
                            
                                Decanus Terminal
                                Remote management of your HSM and user partition
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Securosys 365 DKE - adds in for Microsoft 
                                Enhance data privacy: Safeguarding Microsoft Office 365 data with your secure HSM keys
                                
                                    Read
	
                                
                            
                            
                                Securosys 365 DKE - adds in for Microsoft 
                                Enhance data privacy: Safeguarding Microsoft Office 365 data with your secure HSM keys
                                
                                    Read
                                
                            
                        
                    
                Load more
                
                        Whitepapers (5)
                    
                    View All
                 Safeguarding of Crypto Assets
                            
                            
                                
                                In this paper, we address various aspects of safeguarding cryptocurrencies and other crypto-assets. The focus is on security,scaling, insurability, and regulatory aspects.
                                
                                    Read
	
                                Safeguarding of Crypto Assets
                            
                            
                                
                                In this paper, we address various aspects of safeguarding cryptocurrencies and other crypto-assets. The focus is on security,scaling, insurability, and regulatory aspects.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Securing Oracle with Primus Hardware Security Module
                            
                            
                                
                                The installation and benefits of this solution are described by Marcel Suter of our partner firm libC Technologies SA in this solution brief.
                                
                                    Read
	
                                Securing Oracle with Primus Hardware Security Module
                            
                            
                                
                                The installation and benefits of this solution are described by Marcel Suter of our partner firm libC Technologies SA in this solution brief.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 How to Attack a Provenly Secure Algorithm and Harden it Thereafter
                            
                            
                                
                                A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on those topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available in this white paper
                                
                                    Read
	
                                How to Attack a Provenly Secure Algorithm and Harden it Thereafter
                            
                            
                                
                                A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on those topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available in this white paper
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Efficient Architecture for ECC-Based Authentication 
                            
                            
                                
                                In a project, In collaboration with the University of Applied Science (HSR) in Rapperswil, Switzerland, Securosys has investigated ways to protect information in the future. The researchers of the Institute for Microelectronics and Embedded Systems (IMES) have developed, among other, a computing architecture, which, to the best of their knowledge, is most effective for calculating ECC-based algorithms, which are often used in connection with digital signatures.
                                
                                    Read
	
                                Efficient Architecture for ECC-Based Authentication 
                            
                            
                                
                                In a project, In collaboration with the University of Applied Science (HSR) in Rapperswil, Switzerland, Securosys has investigated ways to protect information in the future. The researchers of the Institute for Microelectronics and Embedded Systems (IMES) have developed, among other, a computing architecture, which, to the best of their knowledge, is most effective for calculating ECC-based algorithms, which are often used in connection with digital signatures.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Optimally Secured Blockchain Environments
                            
                            
                                
                                Securosys is raising the bar for maximally secure asset management by introducing an advanced layer of blockchain-enhanced protection for execution of applications operating on separate, server-based enclaves
                                
                                    Read
	
                                Optimally Secured Blockchain Environments
                            
                            
                                
                                Securosys is raising the bar for maximally secure asset management by introducing an advanced layer of blockchain-enhanced protection for execution of applications operating on separate, server-based enclaves
                                
                                    Read
                                
                            
                        
                    
                Load more
                
                        Research Papers (4)
                    
                    View All
                 On Power-analysis Resistant Hardware Implementation of ECCOn Power-analysis Resistant Hardware Implementation of ECC
                            
                            
                                
                                Roman Willi, Andreas Curiger, and Paul Zbinden. 2016 Euromicro Conference on Digital System Design, DSD 2016, pages 665-669. IEEE Computer Society, 2016.
                                
                                    Read
	
                                On Power-analysis Resistant Hardware Implementation of ECCOn Power-analysis Resistant Hardware Implementation of ECC
                            
                            
                                
                                Roman Willi, Andreas Curiger, and Paul Zbinden. 2016 Euromicro Conference on Digital System Design, DSD 2016, pages 665-669. IEEE Computer Society, 2016.
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Flexible FPGA-Based Architectures for Curve Point Multiplication over GF(p)
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. 2016 Euromicro Conference on Digital System Design (DSD), 2016
                                
                                    Read
	
                                Flexible FPGA-Based Architectures for Curve Point Multiplication over GF(p)
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. 2016 Euromicro Conference on Digital System Design (DSD), 2016
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 Defeating NewHope with a Single Trace
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Leuenberger, Lukas; Zbinden, Paul. Post-Quantum Cryptography, 2020
                                
                                    Read
	
                                Defeating NewHope with a Single Trace
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Leuenberger, Lukas; Zbinden, Paul. Post-Quantum Cryptography, 2020
                                
                                    Read
                                
                            
                        
                    
                        
                            
                                
                                
	
	
		
	
	
		 FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. IACR Transactions on Cryptographic Hardware and Embedded Systems, 1, 2018
                                
                                    Read
	
                                FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256
                            
                            
                                
                                Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. IACR Transactions on Cryptographic Hardware and Embedded Systems, 1, 2018
                                
                                    Read
                                
                            
                        
                    
                Load more
                Nothing to be found
        
 
	
                                             
	
                                             
	
                                             
	
                                             
	
                                             
	
                                            