Close

Our key competencies

System Security


Analysis of system assets and definition of system level requirements for the entire life cycle of the product/service.

SoC integration


Orchestrate all the needed ingredients, from storage of sensitive information to protected communications.

Crypto SW libs


From full featured and flexible libraries to highly optimised algorithms tailored to the target device.

Crypto HW IP


Standard and custom algorithms, from tiny implementations to very high throughput engines.

Side-channel


Know-how on state of the art attacks and development of effective countermeasures.

Methodologies


Methodologies and tools to evaluate and guarantee the robustness of the solutions.