Software Solutions

Cryptographic Library

  • AES Software Implementation
  • RSA Software Implementation
  • ECC Software Implementation
  • Hash Software Implementation
  • MAC Software Implementation

Necessary algorithms for these applications and optional support or joint development

  • Secure Boot
  • AES
  • HMAC or RSA or ECC
  • Full Disk Encryption
  • AES
  • HMAC

Deliverables for each algorithm

  • Technical Specifications
  • Library
  • API documentation (Doxygen)
  • Test plan (test vectors definition)
  • Functional test report


  • Protection against timing attacks, including cache attacks
  • Protection against Row Hammer attacks


  • Protection against embedded system attacks
  • Hardware TRNG, for key generation, IV generation


For more information, please get in touch with us

Contact us by completing the information below