More Fields

Filters

Profiles which have:

Recent Changes

Profiles with recent changes to:
Sign up to Download

1-30 of 337 results

  • isgfederal.com
  • 1
InfoSec Global Federal is a cryptographic security company that specializes in providing next generation cryptographic discovery, agility, and management solutions from the silicon firmware up through end-point applications. Our secure software..

Relevance: 107.37645
  • insesoco.ru
  • 1
  • 1
Provides services in cybersecurity, including expertise, consulting, implementation and support of systems and data protection tools... Specializes on research and technological development in information security and conducts field-specific market..

Relevance: 43.869152
  • www.venarisecurity.com
  • 11
Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic... Venari Security provides a complimentary, one-time evaluation of..

Relevance: 42.466145
  • people.inf.ethz.ch
Motivation. Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes..

Relevance: 41.270737
  • www.pqsecurity.com
  • 1
  • 6
PQSecure is a security solutions company specializing in the area of quantum-safe cryptographic solutions with a focus on low resource devices such as IoT... PQSecure has been designing and developing production-ready cryptographic solutions and IPS..

Relevance: 41.00781
  • symbolic.software
Founded in 2018, Symbolic Software is an applied cryptography team based in Paris that champions global digital security through extensive services, including security audits, cryptographic protocol design, and formal verification. We pride ourselves..

Relevance: 40.973743
  • cryptoservices.github.io
  • 1
NCC Group's Cryptography Services practice is a specialized team of consultants focusing exclusively on the most challenging projects involving cryptographic primitives, protocols, implementations, systems, and applications. The team combines years..

Relevance: 40.850533
  • www.infosecglobal.com
  • 1
  • 22
InfoSec Global, a leader in Cryptographic Agility Management, today announced it has joined the Microsoft Intelligent Security Association (MISA)... As the leader and pioneer in crypto-agility, InfoSec Global is helping to establish the foundation..

Relevance: 40.668594
  • www.safecrypto.eu
  • 6
SAFEcrypto brings together a consortium of four academic institutions, one research-intensive cyber-security SME and two multi-national security companies, providing a balance of expertise in theoretical cryptographic primitive construction,..

Relevance: 40.5655
  • profet.at
  • 1
  • 1
PROFET targets at designing public-key cryptography capable to secure tomorrow's Internet which will encompass paradigms such as cloud computing, the IoT and distributed ledgers as essential ingredients. We thereby want to specifically put our focus..

Relevance: 39.88195
  • www.enovatech.com
  • 1
  • 3
Data is the most valuable asset of any the organizations. With more than 20+ years of experience in data security, Enova offers FIPS 140-2 level 3 certified single chip crypto module (chip) and system level security solutions. Enova is equipped with..

Relevance: 38.527905
  • www.keylength.com
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the..

Relevance: 37.78737
  • altasicuro.com
  • 1
Using our proprietary security controllers and patented cryptographic algorithms, we aim to provide the most secure, reliable and flexible IT solutions to our customers...

Relevance: 37.58737
  • k3des.com
  • 1
  • 1
K3DES, LLC is a technology consulting firm focused on the security of electronic payments systems - debit, credit, and stored value cards. The firm provides computer and network security assessments, network vulnerability scanning, application..

Relevance: 37.56373
  • itcrypto.github.io
  • 17
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries... The design and implementation of cryptographic protocols and primitives with unconditional security guarantees... The usage of..

Relevance: 37.151016
  • www.weaponre.com
  • 1
  • 2
Accomplished in all disciplines of hardware, firmware and software engineering and reverse-engineering thereof. Proficient in secure system design and cryptographic implementations and also deconstruction and security analysis...

Relevance: 36.87655
  • www.patero.de
Our Team is comprised of security professionals with backgrounds in government, military and technology... Patero builds and deploys Quantum Secure cryptographic solutions that protect National Security, Critical Infrastructure, and Supply Chain..

Relevance: 36.767277
  • project-everest.github.io
  • 5
We are a team of researchers and engineers from several organizations, including Microsoft Research, Carnegie Mellon University, INRIA, and the MSR-INRIA joint center... Focusing on the HTTPS ecosystem, including components such as the TLS protocol..

Relevance: 36.67748
  • icmconference.org
  • 5
  • 5
  • 17
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification including The Commercial Solutions for..

Relevance: 36.453865
  • infosecurityinc.com
  • 1
  • 5
Information Security Incorporated is a consulting firm founded by Noel Matchett in 1985. ISI and their affiliated companies provide specialized consulting and training to US and international clients... Cybersecurity cryptographic consulting..

Relevance: 36.112293
  • www.prigm.com.tr
  • 2
PRIGM is our multi-purpose Hardware Security Module (HSM) with 1 Gbit/sec true random number generation throughput that is equipped with advanced symmetric/asymmetric cryptographic algorithms, hashing, key generation & management, and other digital..

Relevance: 35.982834
  • www.primefactors.com
  • 1
  • 4
Prime Factors is a global leader in applied data protection software, helping to secure an open and collaborative digital world. We simplify the complexities of data security with encryption, tokenization, data masking, and cryptographic key..

Relevance: 35.798317
  • www.pureid.io
  • 1
  • 6
PureID is an IT Security company incorporated in UK with its Research & Development facilities in India and USA. With multiple inventions & patents to its credit, PureID is offering market defining products and solutions in the field of cryptographic..

Relevance: 35.68004
  • www.icrypto.org
International Cryptology Associates (iCrypto) aims to understanding the power of cryptography and exploring, developing, and leveraging advanced technology for today's information security and privacy; from appropriate definitions and proofs of..

Relevance: 35.548103
  • libpqcrypto.org
PQCRYPTO, working jointly with many other researchers around the world, submitted 22 proposals to NIST's ongoing post-quantum standardization project. Each submission specifies a family of cryptographic systems, offering various tradeoffs between..

Relevance: 35.07673
  • endecoder.com
Robust data security: AES employs sophisticated cryptographic techniques to deliver a heightened level of security for your information. Your messages are securely guarded, preventing unauthorized access and viewing... Strong encryption using the..

Relevance: 35.03802
  • latentcap.com
  • 1
Latent Capital is a special situation incubation and investment vehicle with a focus on cryptographic infrastructure... Leveraging deep industry expertise, Latent identifies and incubates high-potential projects at the forefront of digital security..

Relevance: 34.91461
  • www.algonics.net
Chief computer scientist at Inpher Inc, and associate professor at Université de Versailles... I am responsible for the research and development of new security and cryptographic software for distributed systems in the cloud environment...

Relevance: 34.898758
  • hkscy.org
  • 1
Hi! I'm currently a research associate working at the Alan Turing Institute on trustworthy digital identity with Professor Jon Crowcroft. My main research interests include digital identity, security and privacy, with a focus on privacy-enhancing..

Relevance: 34.82489
  • www.erstahill.com
I am a security researcher at Ericsson and an industrial PhD student in the Theoretical Computer Science group (TCS) at KTH Royal Institute of Technology. My research topic is modelling, verification and proof techniques for cryptographic protocols..

Relevance: 34.81152