Loading...
Browse 151 cryptography tools
Post-quantum photonic layer security for data-in-transit protection
Post-quantum photonic layer security for data-in-transit protection
Quantum random number generator chip for cryptographic applications
Quantum random number generator chip for cryptographic applications
HSM with embedded quantum random number generator for cryptographic operations
HSM with embedded quantum random number generator for cryptographic operations
Quantum random number generation for satellite cybersecurity applications
Quantum random number generation for satellite cybersecurity applications
Invisible 2FA using device-bound cryptographic auth for PingOne DaVinci
Invisible 2FA using device-bound cryptographic auth for PingOne DaVinci
Passkey-based authentication for one-click checkout with device binding
Passkey-based authentication for one-click checkout with device binding
Quantum Key Distribution system for ultra-secure communications
One-time pad encryption system for secure data transmission over internet
Digital signature solution using biometric verification and cryptography
Digital signature solution using biometric verification and cryptography
Embedded systems security for IoT devices and operating systems
Embedded systems security for IoT devices and operating systems
Hardware wallet for cryptocurrency storage and management
Enables secure analytics across data silos using cryptographic verification
Enables secure analytics across data silos using cryptographic verification
Web3-based decentralized identity platform for access control using crypto
Web3-based decentralized identity platform for access control using crypto
Blockchain-based platform for crypto identity verification and compliance
Blockchain-based platform for crypto identity verification and compliance
Platform providing data integrity and verifiable transparency using TEEs and DLT
Platform providing data integrity and verifiable transparency using TEEs and DLT
Image-based encryption platform for securing and sharing sensitive data
Image-based encryption platform for securing and sharing sensitive data
Image-based authentication system for passwordless login, MFA, and recovery
Image-based authentication system for passwordless login, MFA, and recovery
Platform for continuous validation and proof of cybersecurity safeguards
Platform for continuous validation and proof of cybersecurity safeguards
Privacy-first app dev platform using MPC to compute on encrypted data
Privacy-first app dev platform using MPC to compute on encrypted data
Network for private shared state using MPC and coSNARKs for encrypted data.
Network for private shared state using MPC and coSNARKs for encrypted data.
COMSEC compliance platform for cryptographic modernization transitions
COMSEC compliance platform for cryptographic modernization transitions
Electronic signature app using DNIe 3.0 and NFC technology on Android devices
Electronic signature app using DNIe 3.0 and NFC technology on Android devices
Post-quantum secure authentication solution for digital access protection
Post-quantum secure authentication solution for digital access protection
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance