Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, and software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreThis section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreStay informed with our latest updates, announcements, and insights, including industry developments, company milestones, and important highlights shaping our work and community.
Learn MoreRead our official statements and announcements for media and stakeholders, featuring key company updates, partnerships, product launches, and other important organizational news.
Learn MoreJoin our online sessions to explore expert insights, practical knowledge, and discussions on relevant topics. Watch live or access recordings to learn from industry professionals.
Learn MoreDiscover upcoming conferences, meetings, and special gatherings where you can connect with our team, partners, and community members, and stay engaged with our latest initiatives.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join Us

Chief Innovation Officer
Yaacov was born in the USSR, where he studied mathematics, and immigrated to Israel in 1987. Since 1998, he has worked in security, primarily at the hardware level, first at NDS (later acquired by Cisco), and subsequently at Intel (2017) as part of its red team. In 2020, he joined FortifyIQ as Chief Innovation Officer.
Since 2013, his research focus has been on physical attacks and algorithmic countermeasures against them. He is the inventor of 30 granted patents and the author of 6 academic papers, all in the field of security.
Post-quantum algorithms ML-KEM and ML-DSA, based on Crystals Kyber and Crystals Dilithium, respectively, have been recently standardized by NIST in FIPS 203 and FIPS 204, and are rapidly being adopted worldwide. However, these algorithms are highly vulnerable to physical attacks, including side-channel attacks that can succeed with only a single trace. Masking-based countermeasures exist, but they introduce significant overhead in performance, gate count, and power consumption. Furthermore, a growing body of academic work has demonstrated practical attacks against masked implementations.
FortifyIQ has developed a unique algorithmic protection against physical attacks for both ML-KEM and ML-DSA, which is not based on masking and delivers significantly superior PPA compared to masking-based approaches. The method transforms computations into a large redundant domain, following the same core design principles as FortifyIQ’s AES protection schemes, which have successfully passed AVA.VAN.5 evaluation by a leading Common Criteria lab and are already deployed in millions of devices. This protection also extends to critical operations such as composition and decomposition, which are known to be particularly sensitive to side-channel leakage, and are not protected by standard masking techniques.
FortifyIQ provides a combined hardware + firmware solution. For already manufactured devices, or in cases where hardware constraints prevent full integration, FortifyIQ also offers software libraries for both ML-KEM and ML-DSA implementing the same underlying algorithmic protection. All products share a unified API.
FortifyIQ enables end-to-end crypto-agility across parameter sets and protection levels through over-the-air downloads, and even algorithm migration, through a consistent software-defined implementation path with a seamless transition to hardware acceleration via the same API. This ensures long-term adaptability without redesigning system integration layers.
In addition, FortifyIQ maintains outstanding benchmark results (available under NDA), demonstrating efficient operation even on highly constrained devices, enabling secure deployment across ultra-limited embedded environments.