Companies similar to INFOSEC GLOBAL FEDERAL
Sign up to Download

1-30 of 193,467 results

  • www.venarisecurity.com
  • 11
Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic... Venari Security provides a complimentary, one-time evaluation of..

Relevance: 21.830591
  • insesoco.ru
  • 1
  • 1
Provides services in cybersecurity, including expertise, consulting, implementation and support of systems and data protection tools... Specializes on research and technological development in information security and conducts field-specific market..

Relevance: 21.476885
  • symbolic.software
Founded in 2018, Symbolic Software is an applied cryptography team based in Paris that champions global digital security through extensive services, including security audits, cryptographic protocol design, and formal verification. We pride ourselves..

Relevance: 21.196259
  • isgfederal.com
  • 1
InfoSec Global Federal is a cryptographic security company that specializes in providing next generation cryptographic discovery, agility, and management solutions from the silicon firmware up through end-point applications. Our secure software..

Relevance: 21.154865
  • www.pqsecurity.com
  • 1
  • 6
PQSecure is a security solutions company specializing in the area of quantum-safe cryptographic solutions with a focus on low resource devices such as IoT... PQSecure has been designing and developing production-ready cryptographic solutions and IPS..

Relevance: 20.998737
  • cryptoservices.github.io
  • 1
NCC Group's Cryptography Services practice is a specialized team of consultants focusing exclusively on the most challenging projects involving cryptographic primitives, protocols, implementations, systems, and applications. The team combines years..

Relevance: 20.841566
  • people.inf.ethz.ch
Motivation. Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes..

Relevance: 20.832457
  • www.safecrypto.eu
  • 6
SAFEcrypto brings together a consortium of four academic institutions, one research-intensive cyber-security SME and two multi-national security companies, providing a balance of expertise in theoretical cryptographic primitive construction,..

Relevance: 20.818241
  • www.infosecglobal.com
  • 1
  • 22
InfoSec Global, a leader in Cryptographic Agility Management, today announced it has joined the Microsoft Intelligent Security Association (MISA)... As the leader and pioneer in crypto-agility, InfoSec Global is helping to establish the foundation..

Relevance: 20.772789
  • benjamindowling.com
  • 1
Broadly speaking, my research interests focuses on the provable security of real-world cryptographic protocols. I am also interested in anticipating future threats, against stronger and better equipped attackers, so we can design and implement..

Relevance: 20.474436
  • profet.at
  • 1
  • 1
PROFET targets at designing public-key cryptography capable to secure tomorrow's Internet which will encompass paradigms such as cloud computing, the IoT and distributed ledgers as essential ingredients. We thereby want to specifically put our focus..

Relevance: 20.032944
  • www.enovatech.com
  • 1
  • 3
Data is the most valuable asset of any the organizations. With more than 20+ years of experience in data security, Enova offers FIPS 140-2 level 3 certified single chip crypto module (chip) and system level security solutions. Enova is equipped with..

Relevance: 19.946083
  • k3des.com
  • 1
  • 1
K3DES, LLC is a technology consulting firm focused on the security of electronic payments systems - debit, credit, and stored value cards. The firm provides computer and network security assessments, network vulnerability scanning, application..

Relevance: 19.711967
  • www.keylength.com
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the..

Relevance: 19.295681
  • itcrypto.github.io
  • 17
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries... The design and implementation of cryptographic protocols and primitives with unconditional security guarantees... The usage of..

Relevance: 19.107357
  • itcrypto.github.io
  • 17
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries... The design and implementation of cryptographic protocols and primitives with unconditional security guarantees... The usage of..

Relevance: 18.846504
  • www.patero.de
Our Team is comprised of security professionals with backgrounds in government, military and technology... Patero builds and deploys Quantum Secure cryptographic solutions that protect National Security, Critical Infrastructure, and Supply Chain..

Relevance: 18.833088
  • icmconference.org
  • 5
  • 5
  • 21
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification including The Commercial Solutions for..

Relevance: 18.7093
  • www.prigm.com.tr
  • 2
PRIGM is our multi-purpose Hardware Security Module (HSM) with 1 Gbit/sec true random number generation throughput that is equipped with advanced symmetric/asymmetric cryptographic algorithms, hashing, key generation & management, and other digital..

Relevance: 18.675617
  • infosecurityinc.com
  • 1
  • 5
Information Security Incorporated is a consulting firm founded by Noel Matchett in 1985. ISI and their affiliated companies provide specialized consulting and training to US and international clients... Cybersecurity cryptographic consulting..

Relevance: 18.528713
  • project-everest.github.io
  • 5
We are a team of researchers and engineers from several organizations, including Microsoft Research, Carnegie Mellon University, INRIA, and the MSR-INRIA joint center... Focusing on the HTTPS ecosystem, including components such as the TLS protocol..

Relevance: 18.451677
  • www.weaponre.com
  • 1
  • 2
Accomplished in all disciplines of hardware, firmware and software engineering and reverse-engineering thereof. Proficient in secure system design and cryptographic implementations and also deconstruction and security analysis...

Relevance: 18.337341
  • www.biogy.com
  • 1
  • 2
  • 4
Biogy has developed technology spanning biometrics, code obfuscation, cryptographic methods, embedded hardware security, image processing, mobile security, optics, and transaction systems. Over 50 publications and patents have been created by the..

Relevance: 18.301971
  • libpqcrypto.org
PQCRYPTO, working jointly with many other researchers around the world, submitted 22 proposals to NIST's ongoing post-quantum standardization project. Each submission specifies a family of cryptographic systems, offering various tradeoffs between..

Relevance: 18.2265
  • www.icrypto.org
International Cryptology Associates (iCrypto) aims to understanding the power of cryptography and exploring, developing, and leveraging advanced technology for today's information security and privacy; from appropriate definitions and proofs of..

Relevance: 18.208282
  • www.pureid.io
  • 1
  • 6
PureID is an IT Security company incorporated in UK with its Research & Development facilities in India and USA. With multiple inventions & patents to its credit, PureID is offering market defining products and solutions in the field of cryptographic..

Relevance: 18.142265
  • www.steadtechnology.co.uk
  • 1
Stead Technology specialises in the development of embedded Linux Systems targeting a range of processor architectures such as x86 and ARM based devices. In addition to traditional processors, Stead Technology are experienced in producing board..

Relevance: 17.777554
  • hkscy.org
  • 1
Hi! I'm currently a research associate working at the Alan Turing Institute on trustworthy digital identity with Professor Jon Crowcroft. My main research interests include digital identity, security and privacy, with a focus on privacy-enhancing..

Relevance: 17.753716
  • latentcap.com
  • 1
Latent Capital is a special situation incubation and investment vehicle with a focus on cryptographic infrastructure... Leveraging deep industry expertise, Latent identifies and incubates high-potential projects at the forefront of digital security..

Relevance: 17.753588
  • www.algonics.net
Chief computer scientist at Inpher Inc, and associate professor at Université de Versailles... I am responsible for the research and development of new security and cryptographic software for distributed systems in the cloud environment...

Relevance: 17.715355