Publications

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

In this whitepaper, we explore the challenges associated with adopting post-quantum cryptography (PQC) in hardware for resource-constraint devices (embedded and IoT), along with recent ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Elliptic curve cryptography has many security applications, from internet traffic to embedded devices. This guide provides an overview of fault injection attacks which target Elliptic Curve ...
Professionalizing Fault Injection

Professionalizing Fault Injection

Fault Injection can be a tedious task. In this whitepaper we explain how professional tools improve FI (Fault Injection) test results.
Automotive Security Checklist

Automotive Security Checklist

Our experts curated a list of the most essential considerations for better security of your automotive development.
Securing Embedded Devices: 9 Considerations for Success

Securing Embedded Devices: 9 Considerations for Success

We curated a list of the most essential security considerations that we recommend when beginning to incorporate security into your embedded devices. 
Exploring genomic sequence alignment for improving side-channel analysis

Exploring genomic sequence alignment for improving side-channel analysis

Abstract: Side-channel analysis (SCA) extracts sensitive information from a device by analyzing information that is leaked through side channels. These measurements are correlated with specific ...
Forgotten Essence Of The Backend Penetration Testing

Forgotten Essence Of The Backend Penetration Testing

At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has ...
Whip the Whisperer: Blackhat 2022

Whip the Whisperer: Blackhat 2022

Cryptographic side channels are well-known and understood in the industry. There are also many countermeasures against side channels to reduce the leakage risk. However, many implementations in ...
Five things you should know to avoid the most common security errors

Five things you should know to avoid the most common security errors

For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...
Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

In this whitepaper, we explore the challenges associated with adopting post-quantum cryptography (PQC) in hardware for resource-constraint devices (embedded and IoT), along with recent ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Elliptic curve cryptography has many security applications, from internet traffic to embedded devices. This guide provides an overview of fault injection attacks which target Elliptic Curve ...
Professionalizing Fault Injection

Professionalizing Fault Injection

Fault Injection can be a tedious task. In this whitepaper we explain how professional tools improve FI (Fault Injection) test results.
Automotive Security Checklist

Automotive Security Checklist

Our experts curated a list of the most essential considerations for better security of your automotive development.
Securing Embedded Devices: 9 Considerations for Success

Securing Embedded Devices: 9 Considerations for Success

We curated a list of the most essential security considerations that we recommend when beginning to incorporate security into your embedded devices. 
Exploring genomic sequence alignment for improving side-channel analysis

Exploring genomic sequence alignment for improving side-channel analysis

Abstract: Side-channel analysis (SCA) extracts sensitive information from a device by analyzing information that is leaked through side channels. These measurements are correlated with specific ...
Forgotten Essence Of The Backend Penetration Testing

Forgotten Essence Of The Backend Penetration Testing

At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has ...
Whip the Whisperer: Blackhat 2022

Whip the Whisperer: Blackhat 2022

Cryptographic side channels are well-known and understood in the industry. There are also many countermeasures against side channels to reduce the leakage risk. However, many implementations in ...
Five things you should know to avoid the most common security errors

Five things you should know to avoid the most common security errors

For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...