JAVA Toolkit
| home | contact

Home > Products



News Menu

Latest News

ECCelerate 4.01 released!

23/03/2017

We proudly present a new maintenance release of our IAIK ECCelerate™ elliptic curve library! Version 4.01 adds support for curves from the FIDO ECDAA standard and fixes minor bugs. IAIK ECCelerate™ is based on Java 6 technology and has been thoroughly optimized for speed. Currently, it supports ECDSA, ECDH, ECIES and optionally ECMQV.

iSaSiLk 5.105 released!

03/02/2017

iSaSiLk 5.105 Maintenance release fixes some ECC related issues.

References

Our Clients


Our Products

IAIK has a long reputation as a pioneer in security software development. We provide a comprehensive set of crypto products for the Java™ platform that help you make your environment and applications more secure! Take advantage of our knowhow and the top rated security products. In addition to the professional support system we also offer individualized consulting services tailor-made for your company’s needs. See below product descriptions, for all prices please see the price list.

Download here our new product brochure.

 
Our crypto toolkit for the Java™ platform is the heart of our product range. IAIK-JCE comes with its own security provider offering a great variety of cryptographic services and algorithms. It is equipped with a built-in ASN.1 library, supports PKCS, may be used for building PKI solutions, provides a range of self-designed random number generators and is equipped with an extensive demo source library making it easy to become familiar with Cryptography for the Java™ platform and IAIK-JCE.
Make your online communications more secure by encrypting your email and using authentication, confidentiality, integrity and authorization for your data transfer.
Modern Times have changed business communication. We have created toolkits which provide you with strong authentication tools for internet and network security.
IAIK XML Security Toolkit (XSECT) is a tool that provides security features such as digital signature, encryption, and access control for XML documents.
Ink signatures on paper don't really fit to the electronic world. Here, the main interest lies in creating commonly accepted and legally valid electronic signatures. In order to gain the required common acceptance, approved signature standards are used.
In the past couple of years Android™ has become the most widespread mobile platform. Software development for the Android™ platform relies on the Java™ programming language and offers almost all features of the Java™ framework. Hence, together with the high computational power of modern smartphones, our most important crypto toolkits are ready to use for Android™ app development.
We offer dedicated software modules for various microcontroller architectures which achieve highest performance figures. These are software modules with countermeasures against side-channel attacks (SPA, DPA, ...) for implementation on security devices. "Of the shelf" modules as well as the development of modules for new target devices and applications.
We offer our results of HW development activities as crypto IP modules. The modules are designed for various application and can be adapted for your requirements. All modules use quasi-standard SOC interfaces (e.g. AMBA bus) for easy integration.

We offer our research results on security for RFID technology. This includes DemoTag devices which emulate real passive RFID tags in the reader field. The ID of the tag is configurable.
SIC offers a wide range of cryptography- and security-related products for the Java™ platform, covering all aspects of data and communication security. See our complete product list below!

 
print    tip a friend
back to previous page back  |  top to the top of the page