Knowledge Center

Elliptic is an active participant in the security community, and monitors many different security application working groups, standards bodies, RFCs and industry trends. We strive to share our security experience and knowledge with our customers and the community as a whole, by offering a range of tools and information to the public through our Knowledge Centre forum. In addition to publications such as our Whitepapers, our Standards Watch newsletter, Press Releases, we also maintain a Blog, as well as a Glossary and FAQ regarding general security issues, and product-specific topics. Free evaluation tools for our products are also available.

Please select any of the following to find out more:


document icon PRESS RELEASESdocument icon FAQsdocument icon glossarydocument icon Whitepapersdocument icon  product briefs







 Download the Elliptic Corporate Profile >>

Corp Profile Screen Cap for web



tRoot w embedded chip flexible future proof 


Elliptic's Secure Foundation of Trust 

Elliptic's tRoot is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities. tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in the exploding IoT market. Learn more >>


EE Journal logo

"I Am tRoot" by Jim Turley

Apart from handling cold-boot procedures, tRoot also lends a hand in other security-related chores. Need to deliver DRM-protected material? Elliptic's hardware and software will manage the keys. Worried about cloning? Your tRoot is on the job. Concerned that hackers armed with sensitive instruments might mount a side-channel attack? That's the sort of thing tRoot was born to fight. Read the EEJournal article about Elliptic tRoot >> 


S5 Box