Companies similar to D-SIG
Sign up to Download

1-30 of 7,110,697 results

  • d-sig.co.uk
  • 1
D-Sig develops software and hardware to protect industrial data from cyber-attacks. It does this by the use of strong cryptographic algorithms, such as encryption and digital signatures, and the use of cryptographic hardware devices...

Relevance: 29.076406
  • www.cryptocode.com
  • 1
  • 1
CryptoCode technology is based on the algorithms, methods, & implementations we have developed since the early 90's... CryptoCode Inc is a consulting company located in Santa Barbara, California, specializing in cryptographic engineering research..

Relevance: 23.197794
  • cryptodev-linux.org
Cryptodev-linux is a device that allows access to Linux kernel cryptographic drivers; thus allowing of userspace applications to take advantage of hardware accelerators. Cryptodev-linux is implemented as a standalone module that requires no..

Relevance: 22.593323
  • www.kootkey.com
As KootKey is designed based on as per the specifications and standards of Fido Alliance , it works with all the web services which use the Universal Second Factor Authentication... Kootkey is a USB based Universal Second Factor Authentication..

Relevance: 21.754345
  • www.weaponre.com
  • 1
  • 2
Accomplished in all disciplines of hardware, firmware and software engineering and reverse-engineering thereof. Proficient in secure system design and cryptographic implementations and also deconstruction and security analysis...

Relevance: 20.35295
  • www.venarisecurity.com
  • 11
Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic... Venari Security provides a complimentary, one-time evaluation of..

Relevance: 20.280985
  • www.eventus.si
  • 14
  • 4
  • 12
Eventus sistemi is a privately held company focused on distribution of consumer electronics like PC components, gaming peripherals, e-readers, audio, cryptographic hardware and authenticators. We offer warranty and out-of-warranty repair service and..

Relevance: 19.478785
  • www.discocrypto.com
  • 1
  • 1
libdisco is a modern plug-and-play secure protocol and a cryptographic library in Golang. It offers different ways of encrypting communications, as well as different cryptographic primitives for all of an application's needs... libdisco is a library..

Relevance: 19.315292
  • www.warmpointalarm.com
  • 1
All communication is encrypted using TLS version 1.2 with SHA-256 certificates. Each device has a unique private key which is stored in a cryptographic co-processor with secure hardware-based key storage...

Relevance: 19.313549
  • www.prigm.com.tr
  • 2
PRIGM is our multi-purpose Hardware Security Module (HSM) with 1 Gbit/sec true random number generation throughput that is equipped with advanced symmetric/asymmetric cryptographic algorithms, hashing, key generation & management, and other digital..

Relevance: 19.094402
  • icmconference.org
  • 5
  • 5
  • 21
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification including The Commercial Solutions for..

Relevance: 18.617834
  • insesoco.ru
  • 1
  • 1
Provides services in cybersecurity, including expertise, consulting, implementation and support of systems and data protection tools... Specializes on research and technological development in information security and conducts field-specific market..

Relevance: 18.36401
  • parsec.community
Parsec is the Platform Abst Raction for SEC urity, an open-source initiative to provide a common API to hardware security and cryptographic services in a platform-agnostic way. This abstraction layer keeps workloads decoupled from physical platform..

Relevance: 18.063766
  • parsec.community
Parsec is the Platform Abst Raction for SEC urity, an open-source initiative to provide a common API to hardware security and cryptographic services in a platform-agnostic way. This abstraction layer keeps workloads decoupled from physical platform..

Relevance: 18.063766
  • people.inf.ethz.ch
Motivation. Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes..

Relevance: 18.059004
  • www.biogy.com
  • 1
  • 2
  • 4
Biogy has developed technology spanning biometrics, code obfuscation, cryptographic methods, embedded hardware security, image processing, mobile security, optics, and transaction systems. Over 50 publications and patents have been created by the..

Relevance: 18.05849
  • www.embeddeddisco.com
Embedded Disco is an implementation of disco, a protocol designed by merging the Noise protocol framework and the Strobe protocol framework. This means that it supports a subset of Noise's handshakes while offering the cryptographic primitive Strobe..

Relevance: 17.979897
  • www.cyphermines.io
  • 1
We are an affiliate, incorporated in Cayman Islands, of a group of cryptographic infrastructure companies consisting of software development and cryptographic compute facilities, aim to create exceptional value addition to the decentralization of the..

Relevance: 17.808216
  • www.microcrypt.com.ua
  • 5
Microcrypt Technologies LTD. is a vendor of hardware and software cryptographic security solutions... Our company provides a wide spectrum of services in development and support of specialized software and hardware, and also development and..

Relevance: 17.807905
  • www.virtucrypt.com
  • 3
  • 1
VirtuCrypt is the enterprise-grade cloud cryptographic platform by Futurex. VirtuCrypt is a fully managed cloud service for encryption, storage, transmission, and certification of sensitive data. With data centers in each global region and an..

Relevance: 17.657288
  • dragonwallet.jp
  • 2
Cypher Security INC. is the company which established a strong presence in Information security field, earning high reputation for their technology in "MCPCaward2016". DragonWallet is the pure made in Japan product made by Japanese security company..

Relevance: 17.635191
  • isgfederal.com
  • 1
ISG Federal is a cryptographic security company that specializes in providing next generation cryptographic discovery, agility, and management solutions from the silicon firmware up through end-point applications. Our secure software enables the..

Relevance: 17.621399
  • www.data-knight.net
  • 1
Data Knight provides consultation to companies serious about protecting their Intellectual Property..... DataKnight focuses on the development of provably secure crypto systems for hardware, embedded systems, and applications. Our research in..

Relevance: 17.526964
  • securekeygroup.com
  • 2
The SecureKey Group represents recognised marketleading Cryptographic hardware, Data Protection software and high security Digital Signing solutions. Each of our solutions are backed by highly qualified technical teams equiped to handle any..

Relevance: 17.50218
  • www.nthdimtech.com
  • 1
Nth Dimension was founded by Neils Nesse, a free software advocate focused on developing open hardware consumer electronics... We have created a more advanced Signet device called Signet High-Capacity. In addition to the features offered by Signet,..

Relevance: 17.423958
  • olympus-project.eu
  • 1
OLYMPUS is organizing a business workshop to present the technology and project results from a business perspective, towards exploitation... OLYMPUS addresses the challenges associated to the use of privacy-preserving identity management solutions..

Relevance: 17.40135
  • www.motacoin.net
  • 1
MotaCoin is new decentralized, trustless, Cryptographic secured ecosystem for licensed pharmacies. Designed for high adoption. Implemented with speed. Download our iOS or Android Wallet! MotaCoin is new decentralized, trustless, Cryptographic secured..

Relevance: 17.219059
  • www.primefactors.com
  • 1
  • 4
Prime Factors is a global leader in applied data protection software, helping to secure an open and collaborative digital world. We simplify the complexities of data security with encryption, tokenization, data masking, and cryptographic key..

Relevance: 17.188503
  • strategicdigitaldefense.com
I design, implement and maintain cybersecurity and cryptographic technologies to protect your brand, your firm's irreplaceable competitive advantage, your customers' confidential information, your communications and your way of doing business. I am a..

Relevance: 17.177443
  • cryptoswift.io
  • 1
CryptoSwift is a growing collection of standard and secure cryptographic algorithms implemented in Swift... CryptoSwift isn't backed by any big company and is developed in my spare time that I also use to as a freelancer...

Relevance: 17.127003