Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation
27 Aug, 24 | Technical
In this whitepaper, we explore the challenges associated with adopting post-quantum cryptography (PQC) in hardware for resource-constraint devices (embedded and IoT), along with recent ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems
18 Jul, 24 | Technical
Elliptic curve cryptography has many security applications, from internet traffic to embedded devices. This guide provides an overview of fault injection attacks which target Elliptic Curve ...
Exploring genomic sequence alignment for improving side-channel analysis
29 Jun, 23 | Technical
Abstract: Side-channel analysis (SCA) extracts sensitive information from a device by analyzing information that is leaked through side channels. These measurements are correlated with specific ...
Forgotten Essence Of The Backend Penetration Testing
11 Jan, 23 | Business,Technical
At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has ...
Cryptographic side channels are well-known and understood in the industry. There are also many countermeasures against side channels to reduce the leakage risk. However, many implementations in ...
Five things you should know to avoid the most common security errors
29 Mar, 22 | Business
For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...
Security Highlight: Backdoor Key Found in MIFARE Classic Cards
27 Aug, 24 | Security Highlight
A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Shimano Di2 vulnerability: let’s talk about device security in sports
23 Aug, 24 | Security Trends
Integrating technology into new domains can introduce unexpected vulnerabilities. In this blog post, let's talk about the recent discovery of a security flaw in Shimano's Di2 wireless ...
Understanding the FIPS 140-3 Requirements for Cryptographic Devices
23 Jul, 24 | Industry Updates,Learning
The blog post discusses the updated Federal Information Processing Standard (FIPS) 140-3 for cryptographic devices, highlighting its new security requirements and levels, the challenges in ...