Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Showing all entries in ‘Technology Blog’

Whitepaper – Demystifying Security Testing, Evaluation & Certification for Devices & Apps

Riscure & Trustonic have collaborated on an easy-to-read guide to security testing, evaluation & certification - Critical for bringing mobile, IoT & automotive products to market successfully.

Executives, developers, product managers & security researchers - anyone keen to cut through the acronyms and misconceptions in this sometimes dense topic - can now understand the terms, players, processes, and options.

Read More


The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.

Read More



What is TrustZone?

Arm® TrustZone® technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich operating system, from a much smaller, secure operating system.

Read More







Field arithmetic for Curve25519

I recently implemented the elliptic-curve algorithms X25519 (RFC 7748) and Ed25519 (RFC 8032) for Trustonicʼs crypto library, in portable C. These algorithms provide primitives for key agreement and digital signatures respectively.

Read More


Back to top