Skip to content
Products
Protection of AI-Models
Root of Trust (RoT)
Software Libraries
FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
Security Cryptographic HW IP Cores
FortiCrypt
AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
FortiMac
HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
FortiPKA
FortifyIQ | Public Key Accelerator (PKA)
FortiPKEx
EDA Tools for Security Assessment and Verification
SideChannel Studio
FaultInjection Studio
Professional Services
Insights
Conference Papers
Whitepapers
Explanatory Videos
News
Company
About Us
Services
Careers
Products
Protection of AI-Models
Root of Trust (RoT)
Software Libraries
FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
Security Cryptographic HW IP Cores
FortiCrypt
AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
FortiMac
HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
FortiPKA
FortifyIQ | Public Key Accelerator (PKA)
FortiPKEx
EDA Tools for Security Assessment and Verification
SideChannel Studio
FaultInjection Studio
Professional Services
Insights
Conference Papers
Whitepapers
Explanatory Videos
News
Company
About Us
Services
Careers
Contact Us
Whitepapers
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer.
What can be done to protect IoT devices from such attacks?
Global Cryptographic Keys in the Iot World and the Threats They Present
Mitigate the risk and protect your hardware against side-channel attacks on its secure element.
Start Reading
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.
Start Reading
Discover a new approach to developing protection for smart cards against DEMA attacks, allowing manufacturers to cut protection costs and save time during development.
Start Reading
FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.
Start Reading