Our key competencies

System Security

Analysis of system assets and definition of system level requirements for the entire life cycle of the product/service.

SoC integration

Orchestrate all the needed ingredients, from storage of sensitive information to protected communications.

Crypto SW libs

From full featured and flexible libraries to highly optimised algorithms tailored to the target device.

Crypto HW IP

Standard and custom algorithms, from tiny implementations to very high throughput engines.


Know-how on state of the art attacks and development of effective countermeasures.


Methodologies and tools to evaluate and guarantee the robustness of the solutions.