Systematic
Thématique : Confiance Numérique & Sécurité
Effacer vos filtres
Image par default

Smart-SIC Virtualyzer

SECURE-IC SAS

Side-Channel Analysis on Verilog/VHDL Source Code

Image par default

MASA SWORD

MASA GROUP

Complete, high-level, automated simulation for cost-efficient training, analysis and planning

Image par default

Smart-SIC Analyzer

SECURE-IC SAS

Security evaluation for embedded systems

Image par default

LYNX

EVITECH ( ELECTRONIC VISION TECHNOLOGIES)

Video analytics solution for crowd supervision and control

Image par default

Secure JTAG (SIC-Trusted)

SECURE-IC SAS

SIC-Trusted IP Core for ASIC/FPGA Protection

Image par default

JAGUAR

EVITECH ( ELECTRONIC VISION TECHNOLOGIES)

Video analysis for the protection of sensitive sites

Image par default

Active Shield (SIC-Trusted)

SECURE-IC SAS

SIC-Trusted IP Core for ASIC Protection

Image par default

Secure embedded cryptographic libraries

CRYPTOEXPERTS

Cycle-accurate optimized cryptographic algorithms, on various hardware platforms

Image par default

ISAP

EGIDIUM TECHNOLOGIES

Integrated Security Automation Platform for critical infrastructure protection

Newsletter Systematic