<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
90-Day CloudHSM Free Trial – Experience Securosys CloudHSM without commitment.
Start your Free Trial
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship Hardware Security Modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.
All
Use Cases & Success Stories
Solution Briefs
Whitepapers
Research Papers

Whitepapers
(5)

View All
Rectangle-6 Safeguarding of Crypto Assets In this paper, we address various aspects of safeguarding cryptocurrencies and other crypto-assets. The focus is on security,scaling, insurability, and regulatory aspects. Read colourful-background-patterns Securing Oracle with Primus Hardware Security Module The installation and benefits of this solution are described by Marcel Suter of our partner firm libC Technologies SA in this solution brief. Read Rectangle-5 How to Attack a Provenly Secure Algorithm and Harden it Thereafter A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on those topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available in this white paper Read colourful-background-patterns-4 Efficient Architecture for ECC-Based Authentication In a project, In collaboration with the University of Applied Science (HSR) in Rapperswil, Switzerland, Securosys has investigated ways to protect information in the future. The researchers of the Institute for Microelectronics and Embedded Systems (IMES) have developed, among other, a computing architecture, which, to the best of their knowledge, is most effective for calculating ECC-based algorithms, which are often used in connection with digital signatures. Read