Companies similar to DISCO
Sign up to Download

1-30 of 6,667,783 results

  • www.discocrypto.com
  • 1
  • 1
libdisco is a modern plug-and-play secure protocol and a cryptographic library in Golang. It offers different ways of encrypting communications, as well as different cryptographic primitives for all of an application's needs... libdisco is a library..

Relevance: 31.467775
  • openmls.tech
  • 1
OpenMLS is a Rust implementation of Messaging Layer Security based on draft 12+. OpenMLS provides a high-level API to create and manage MLS groups. It supports basic ciphersuites, as well as an interchangable cryptographic backend, key store and..

Relevance: 21.664703
  • www.trustiosity.com
  • 2
Snow currently uses the OpenSSL library: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" "This product includes cryptographic software written by Eric Young..

Relevance: 21.26667
  • www.keylength.com
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the..

Relevance: 20.032784
  • openzl.org
OpenZL is an open-source library for development of secure, high-performance, zero-knowledge applications. OpenZL aims to bridge the gap between high-level languages that miss valuable opportunities for optimization and low-level libraries that..

Relevance: 19.872185
  • www.qusecure.com
  • 2
  • 1
  • 31
At QuSecure, we know that certain industries have unique needs and challenges. When it comes to achieving quantum security, a different approach is required. With our diverse team of subject matter experts, we bring a strong track record of..

Relevance: 18.98746
  • www.currencyroot.com
  • 2
  • 1
As new currencies join the international marketplace, particularly cryptographic currencies for which there has been tremendous activity since the invention and open implementation of blockchain technology, our goal is one of inclusion of all..

Relevance: 18.96224
  • insesoco.ru
  • 1
  • 1
Provides services in cybersecurity, including expertise, consulting, implementation and support of systems and data protection tools... Specializes on research and technological development in information security and conducts field-specific market..

Relevance: 18.679203
  • www.cryptomanager.com
You can easily perform various operations in many popular cryptographic systems with help of SCV Cryptomanager. SCV Cryptomanager works with symmetric encryption systems, public-key cryptography, various hashes and other important data manipulation..

Relevance: 18.607271
  • www.iso-register.com
  • 1
  • 1
The ISO/IEC Register of cryptographic algorithms serves as a common reference point for the identification of cryptographic algorithms by a unique name. The register is also a repository of basic parameters identified with the register entry. The..

Relevance: 18.44279
  • primetype.co.uk
  • 1
Prime Type Ltd was created in 2017 as a one man consultancy specializing in cryptographic applied to software engineering. In short, I was given a cryptographic paper and I was translating them in or programming languages... Prime Type Ltd, the..

Relevance: 18.380533
  • www.cryptocode.com
  • 1
  • 1
CryptoCode technology is based on the algorithms, methods, & implementations we have developed since the early 90's... CryptoCode Inc is a consulting company located in Santa Barbara, California, specializing in cryptographic engineering research..

Relevance: 18.353367
  • isgfederal.com
  • 1
ISG Federal is a cryptographic security company that specializes in providing next generation cryptographic discovery, agility, and management solutions from the silicon firmware up through end-point applications. Our secure software enables the..

Relevance: 18.319124
  • d-sig.co.uk
  • 1
D-Sig develops software and hardware to protect industrial data from cyber-attacks. It does this by the use of strong cryptographic algorithms, such as encryption and digital signatures, and the use of cryptographic hardware devices...

Relevance: 18.19166
  • cryptodev-linux.org
Cryptodev-linux is a device that allows access to Linux kernel cryptographic drivers; thus allowing of userspace applications to take advantage of hardware accelerators. Cryptodev-linux is implemented as a standalone module that requires no..

Relevance: 18.13173
  • www.pqsecurity.com
  • 1
  • 6
PQSecure is a security solutions company specializing in the area of quantum-safe cryptographic solutions with a focus on low resource devices such as IoT... PQSecure has been designing and developing production-ready cryptographic solutions and IPS..

Relevance: 18.035135
  • people.inf.ethz.ch
Motivation. Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes..

Relevance: 17.962471
  • www.infosecglobal.com
  • 1
  • 22
InfoSec Global, a leader in Cryptographic Agility Management, today announced it has joined the Microsoft Intelligent Security Association (MISA)... As the leader and pioneer in crypto-agility, InfoSec Global is helping to establish the foundation..

Relevance: 17.961676
  • www.cyphermines.io
  • 1
We are an affiliate, incorporated in Cayman Islands, of a group of cryptographic infrastructure companies consisting of software development and cryptographic compute facilities, aim to create exceptional value addition to the decentralization of the..

Relevance: 17.943703
  • www.nanoteq.com
  • 4
  • 2
Nanoteq was established in 1988 with the core focus of developing trusted high-level cryptographic technology that can be used in various products and solutions. Today, more than 32 years later, our track record confirms that we have successfully..

Relevance: 17.699144
  • www.obada.io
  • 1
  • 10
Founded in 2017, OBADA is a coalition of over 100 organizations that provided asset disposition services for end-of-life electroncs. The goal is to provide cryptographic PROOF when device data is destroyed and when devices are properly recycled.....

Relevance: 17.592577
  • www.hacs-workshop.org
We see these trends continuing to converge. The importance and complexity of cryptographic software makes it an ideal application for formal and high-assurance verification. The Workshop on High Assurance Crypto Software (HACS) was launched in 2016..

Relevance: 17.579947
  • www.venarisecurity.com
  • 11
Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic... Venari Security provides a complimentary, one-time evaluation of..

Relevance: 17.4342
  • strategicdigitaldefense.com
I design, implement and maintain cybersecurity and cryptographic technologies to protect your brand, your firm's irreplaceable competitive advantage, your customers' confidential information, your communications and your way of doing business. I am a..

Relevance: 17.361645
  • icmconference.org
  • 5
  • 5
  • 21
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification including The Commercial Solutions for..

Relevance: 17.2942
  • profet.at
  • 1
  • 1
PROFET targets at designing public-key cryptography capable to secure tomorrow's Internet which will encompass paradigms such as cloud computing, the IoT and distributed ledgers as essential ingredients. We thereby want to specifically put our focus..

Relevance: 17.019312
  • www.myagasti.com
  • 1
  • 1
We Provide a very Huge Library Infrastructure and Silence Zone For Library and Library has Plenty of Books on Different-Different Topics... We Provide Advance Fire sensors, Smoke Detector sensors, and advance Fire Safety Equipment as Per Government..

Relevance: 16.890638
  • www.scipr-lab.org
SCIPR Lab is a multi-institutional academic collaboration of researchers seeking to bring to practice cryptographic proof systems that provide succinct integrity and privacy... The TinyRAM architecture is a random-access machine designed to be a..

Relevance: 16.885345
  • www.orekit.org
  • 1
Orekit is a free library providing accurate and efficient low level components for the development of flight dynamics applications... As a a low level library, Orekit aims at being used in very different contexts which cannot be foreseen, from quick..

Relevance: 16.842815
  • qwyit.com
  • 1
  • 2
Qwyit™ is pure technology, a cryptographic protocol. It's an Authentication and Data Encryption cryptosystem, built on unique, patented primitives that can be used to build real world cybersecurity solutions. It is core security technology exactly..

Relevance: 16.828794