Stories und Paper
Entdecken Sie unsere Anwendungsfälle, Erfolgsgeschichten und Forschung.
Suchergebnisse
Alles
Anwendungsfälle und kooperative Erfolge
Solution Briefs
Whitepapers
Research Papers
Anwendungsfälle und kooperative Erfolge (4)
Alle anzeigen
Schleupen
Ensuring Secure Energy Transition: Schleupen and Securosys' Collaboration on Smart Meter PKI
Mehr lesen
Crypto Storage AG
Revolutionizing Secure Blockchain Asset Management with Crypto Storage AG
Mehr lesen
KORE Technologies
KORE Technologies and Securosys: Building a Secure, End-to-End Digital Asset Management Platform
Mehr lesen
SIX Interbank Clearing AG
Securosys HSMs Secure Swiss Payment Transactions for Another 10 Years
Mehr lesen
Mehr laden
Solution Briefs (6)
Alle anzeigen
Transaction Security Broker for Crypto Assets
This workflow engine combined with other capabilities of Securosys Hardware Security Modules, provides protection superior to that of the traditional Multi-signature or secure Multi-Party Computation.
Mehr lesen
Security Microsoft PKI Deployment
based on Microsoft Active Directory Certificate Services (AD CS)
Mehr lesen
Decanus Terminal
Remote Administration of Primus HSM and user partitions with Decanus Terminal
Mehr lesen
Decanus Terminal with CloudHSM
Take control of your CloudsHSM partition
Mehr lesen
Key Attestation
Trusted and scalable verification of keys and timestamps
Mehr lesen
Transaction Security Broker for Fintech
Mehr lesen
Mehr laden
Whitepapers (5)
Alle anzeigen
Safeguarding of Crypto Assets
In this paper, we address various aspects of safeguarding cryptocurrencies and other crypto-assets. The focus is on security,scaling, insurability, and regulatory aspects.
Mehr lesen
Securing Oracle with Primus Hardware Security Module
The installation and benefits of this solution are described by Marcel Suter of our partner firm libC Technologies SA in this solution brief.
Mehr lesen
How to Attack a Provenly Secure Algorithm and Harden it Thereafter
A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on those topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available in this white paper
Mehr lesen
Efficient Architecture for ECC-Based Authentication
In a project, In collaboration with the University of Applied Science (HSR) in Rapperswil, Switzerland, Securosys has investigated ways to protect information in the future. The researchers of the Institute for Microelectronics and Embedded Systems (IMES) have developed, among other, a computing architecture, which, to the best of their knowledge, is most effective for calculating ECC-based algorithms, which are often used in connection with digital signatures.
Mehr lesen
Optimally Secured Blockchain Environments
Securosys is raising the bar for maximally secure asset management by introducing an advanced layer of blockchain-enhanced protection for execution of applications operating on separate, server-based enclaves
Mehr lesen
Mehr laden
Research Papers (4)
Alle anzeigen
On Power-analysis Resistant Hardware Implementation of ECCOn Power-analysis Resistant Hardware Implementation of ECC
Roman Willi, Andreas Curiger, and Paul Zbinden. 2016 Euromicro Conference on Digital System Design, DSD 2016, pages 665-669. IEEE Computer Society, 2016.
Mehr lesen
Flexible FPGA-Based Architectures for Curve Point Multiplication over GF(p)
Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. 2016 Euromicro Conference on Digital System Design (DSD), 2016
Mehr lesen
Defeating NewHope with a Single Trace
Amiet, Dorian; Curiger, Andreas; Leuenberger, Lukas; Zbinden, Paul. Post-Quantum Cryptography, 2020
Mehr lesen
FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256
Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. IACR Transactions on Cryptographic Hardware and Embedded Systems, 1, 2018
Mehr lesen
Mehr laden
Nichts zu finden