Smart and Secure Products

Make Your Products and Supply Chain Smart, Secure and Visible with our IoT Solutions and Tools


Learn More

IoT Device Security

Public-Key Authentication Solutions for your Wireless Sensors,NFC, RFID, BLE, MCUs, FPGAs, ASICs, SoCs and more


Learn More

We are Securing the Internet of Things.

We provide identification, authentication, and data protection for small, low-resource devices that are part of the Internet of Things. Our post-quantum solutions address wireless sensors, FPGAs, ASICs, passive tags, and microcontrollers, where current security solutions are too slow, power hungry, or simply will not fit.

Whether you are looking to secure an NFC or Bluetooth device or protect your products from anti-counterfeiting, we can provide you with a complete IoT security solution from development kits to ready-to-use applications, tags, to a secure cloud-based management system.

Our security methods, based on a computationally efficient and highly secure breakthrough in Public-Key Cryptography, are hundreds of times more efficient than today’s solutions, and are used to address supply chain risk, “really” mobile payments, credentials, the Smart Grid, and anti-counterfeiting.

With the advent of quantum computers there are threats to classic cryptographic protocols used on all types of computing platforms. Our quantum-resistant solutions can also secure larger devices where quantum computing attacks are a concern.

LEADERS IN DEVICE & APPLIANCE SECURITY

Latest News

Challenges of Cryptography for Low-energy Devices in the IoT

Published January 10, 2017 by SecureRF

While the low-energy usage of IoT devices confers many advantages in design and applicability, it is also the source of some unique security challenges.

Webinar Replay Available: Jumpstart your IoT Security Project

Published January 5, 2017 by SecureRF

Replay this webinar to learn about our quantum-resistant security methods that address the smallest devices now entering the IoT.

Basics of Cryptography for Chip Design Engineers

Published December 27, 2016 by SecureRF

Over the past few decades, security researchers have developed solutions incorporating two types of cryptographic methods: symmetric-key cryptography and asymmetric-key cryptography.

Cryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds

Published December 23, 2016 by SecureRF

Thieves are using small, handheld devices that wirelessly replicate the signal of car key fobs to unlock and drive away vehicles in mere seconds.

Partners in Security

Search SecureRF