Stories and Paper
Explore our Use Cases, Success Stories, and Research Paper
Search results
All
Use Cases & Success Stories
Solution Briefs
Whitepapers
Research Papers
Use Cases & Success Stories (4)
View All
Schleupen
Ensuring Secure Energy Transition: Schleupen and Securosys' Collaboration on Smart Meter PKI
Read
Crypto Storage AG
Revolutionizing Secure Blockchain Asset Management with Crypto Storage AG
Read
KORE Technologies
KORE Technologies and Securosys: Building a Secure, End-to-End Digital Asset Management Platform
Read
SIX Interbank Clearing AG
Securosys HSMs Secure Swiss Payment Transactions for Another 10 Years
Read
Load more
Solution Briefs (6)
View All
Transaction Security Broker for Crypto Assets
This workflow engine combined with other capabilities of Securosys Hardware Security Modules, provides protection superior to that of the traditional Multi-signature or secure Multi-Party Computation.
Read
Security Microsoft PKI Deployment
based on Microsoft Active Directory Certificate Services (AD CS)
Read
Decanus Terminal
Remote Administration of Primus HSM and user partitions with Decanus Terminal
Read
Decanus Terminal with CloudHSM
Take control of your CloudsHSM partition
Read
Key Attestation
Trusted and scalable verification of keys and timestamps
Read
Transaction Security Broker for Fintech
Read
Load more
Whitepapers (5)
View All
Safeguarding of Crypto Assets
In this paper, we address various aspects of safeguarding cryptocurrencies and other crypto-assets. The focus is on security,scaling, insurability, and regulatory aspects.
Read
Securing Oracle with Primus Hardware Security Module
The installation and benefits of this solution are described by Marcel Suter of our partner firm libC Technologies SA in this solution brief.
Read
How to Attack a Provenly Secure Algorithm and Harden it Thereafter
A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on those topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available in this white paper
Read
Efficient Architecture for ECC-Based Authentication
In a project, In collaboration with the University of Applied Science (HSR) in Rapperswil, Switzerland, Securosys has investigated ways to protect information in the future. The researchers of the Institute for Microelectronics and Embedded Systems (IMES) have developed, among other, a computing architecture, which, to the best of their knowledge, is most effective for calculating ECC-based algorithms, which are often used in connection with digital signatures.
Read
Optimally Secured Blockchain Environments
Securosys is raising the bar for maximally secure asset management by introducing an advanced layer of blockchain-enhanced protection for execution of applications operating on separate, server-based enclaves
Read
Load more
Research Papers (4)
View All
On Power-analysis Resistant Hardware Implementation of ECCOn Power-analysis Resistant Hardware Implementation of ECC
Roman Willi, Andreas Curiger, and Paul Zbinden. 2016 Euromicro Conference on Digital System Design, DSD 2016, pages 665-669. IEEE Computer Society, 2016.
Read
Flexible FPGA-Based Architectures for Curve Point Multiplication over GF(p)
Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. 2016 Euromicro Conference on Digital System Design (DSD), 2016
Read
Defeating NewHope with a Single Trace
Amiet, Dorian; Curiger, Andreas; Leuenberger, Lukas; Zbinden, Paul. Post-Quantum Cryptography, 2020
Read
FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256
Amiet, Dorian; Curiger, Andreas; Zbinden, Paul. IACR Transactions on Cryptographic Hardware and Embedded Systems, 1, 2018
Read
Load more
Nothing to be found