Blog

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

In this whitepaper, we explore the challenges associated with adopting post-quantum cryptography (PQC) in hardware for resource-constraint devices (embedded and IoT), along with recent ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Elliptic curve cryptography has many security applications, from internet traffic to embedded devices. This guide provides an overview of fault injection attacks which target Elliptic Curve ...
Professionalizing Fault Injection

Professionalizing Fault Injection

Fault Injection can be a tedious task. In this whitepaper we explain how professional tools improve FI (Fault Injection) test results.
Automotive Security Checklist

Automotive Security Checklist

Our experts curated a list of the most essential considerations for better security of your automotive development.
Securing Embedded Devices: 9 Considerations for Success

Securing Embedded Devices: 9 Considerations for Success

We curated a list of the most essential security considerations that we recommend when beginning to incorporate security into your embedded devices. 
Exploring genomic sequence alignment for improving side-channel analysis

Exploring genomic sequence alignment for improving side-channel analysis

Abstract: Side-channel analysis (SCA) extracts sensitive information from a device by analyzing information that is leaked through side channels. These measurements are correlated with specific ...
Forgotten Essence Of The Backend Penetration Testing

Forgotten Essence Of The Backend Penetration Testing

At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has ...
Whip the Whisperer: Blackhat 2022

Whip the Whisperer: Blackhat 2022

Cryptographic side channels are well-known and understood in the industry. There are also many countermeasures against side channels to reduce the leakage risk. However, many implementations in ...
Five things you should know to avoid the most common security errors

Five things you should know to avoid the most common security errors

For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...
Reducing Signal Noise for Precise Triggers & Filtering in Side-Channel Analysis & Fault Injection

Reducing Signal Noise for Precise Triggers & Filtering in Side-Channel Analysis & Fault Injection

Discover how Riscure's Transceiver refines signal clarity and boosts the precision of Side-Channel Analysis (SCA) and Fault Injection (FI) triggering.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
My Internship at Riscure: Gabin Le Saout

My Internship at Riscure: Gabin Le Saout

In this blog post, Gabin Le Saout shares his internship journey at Riscure.
Understanding Device Security: What We’ve Learned at Riscure

Understanding Device Security: What We’ve Learned at Riscure

In this blog, we ask our experts how they define device security, and as they shared their thoughts, several common themes stood out.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Shimano Di2 vulnerability: let’s talk about device security in sports

Shimano Di2 vulnerability: let’s talk about device security in sports

Integrating technology into new domains can introduce unexpected vulnerabilities. In this blog post, let's talk about the recent discovery of a security flaw in Shimano's Di2 wireless ...
My Internship at Riscure: Yuezhou Lyu

My Internship at Riscure: Yuezhou Lyu

In this blog post, Yuezhou Lyu shares his internship journey at Riscure.
Understanding the FIPS 140-3 Requirements for Cryptographic Devices

Understanding the FIPS 140-3 Requirements for Cryptographic Devices

The blog post discusses the updated Federal Information Processing Standard (FIPS) 140-3 for cryptographic devices, highlighting its new security requirements and levels, the challenges in ...
My Internship at Riscure: Mans van Someren

My Internship at Riscure: Mans van Someren

In this blog post, Mans van Someren shares his internship journey at Riscure.