Whitepapers

Elliptic routinely authors whitepapers on security topics such as platform security, DRM & content protection, The Internet of Things, key management, hardware cryptographic acceleration and more.

Whitepapers ready for download: 

ARTICLES

Elliptic also authors articles and presentations in major publications on topical security issues:

PRESENTATIONS

Elliptic employees are frequently invited to present at conferences. The following presentations are from some recent events:

 

Featuring

tRoot w embedded chip flexible future proof 

 

Elliptic's Secure Foundation of Trust 

Elliptic's tRoot is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities. tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in the exploding IoT market. Learn more >>

 

EE Journal logo

"I Am tRoot" by Jim Turley

Apart from handling cold-boot procedures, tRoot also lends a hand in other security-related chores. Need to deliver DRM-protected material? Elliptic's hardware and software will manage the keys. Worried about cloning? Your tRoot is on the job. Concerned that hackers armed with sensitive instruments might mount a side-channel attack? That's the sort of thing tRoot was born to fight. Read the EEJournal article about Elliptic tRoot >> 

 

S5 Box