wolfSSL
Suite C-300
Edmonds, WA 98020 [email protected]
+1 (425) 245-8247
https://www.wolfssl.com/
wolfSSL Inc. Announces wolfHSM for Automotive Hardware Security Modules - News
June 07, 2024EDMONDS, Wash., -- wolfSSL INC. announced its new product, wolfHSM, which are automotive HSMs (Hardware Security Modules) designed to improve the security of cryptographic keys and cryptographic processing by isolating signature verification and cryptographic execution into physically independent processors.
Road to embedded world: Infineon Technologies and wolfSSL Commit to Trusted Computing - Blog
April 02, 2024Embedded Computing Design’s Road to embedded world will highlight a host of embedded suppliers who will be showcasing their latest products and technologies at embedded world, April 9th to 11th in Nuremberg, Germany. embedded world is the largest global gathering of its kind. Check back regularly to see where the Road to embedded world takes us.
Road to embedded world '23: Bozeman, Montana, wolfSSL - News
February 06, 2023wolfSSL will be arriving at embedded world 2023 showcasing its embedded TLS library, a portable, C-language-based SSL/TLS library for applications in the areas of IoT, embedded, and RTOS environments. While attending ew '23, stop by booth 4-610 and say hello to wolfSSL.
Post-Quantum Cryptography Now Supported by wolfSSL - News
March 18, 2022wolfSSL Inc. announced that wolfSSL, a security library for embedded systems, supports post-quantum cryptography. Users who utilize the wolfSSL library can communicate using post-quantum cryptography on Transport Layer Security (TLS) without having to make changes to their applications.
Product of the Week: wolfSSL tiny-cURL - Story
June 29, 2021Need client-side data transfer via popular Internet protocols like HTTP and HTTPS, but in an embedded-scale package that will work with 32-bit processor architectures and use less than100 KB of memory? You’ve come to the right place.
Product of the Week: wolfTPM Portable TPM 2.0 Library - Blog
May 07, 2021The Trusted Computing Group’s (TCG’s) Trusted Platform Module 2.0 (TPM 2.0) specification provides the foundation for building hardware-based cryptographic processing functions into modern-day electronic systems. But where do you go from there?
Product of the Week: wolfSSL wolfSentry - Blog
April 13, 2021Intrusion detection and prevention systems (IDPS) can be described as advanced firewalls that help guard against both internal and external network-borne threats. They are usually deployed in the context of an entire network. But what about detecting and preventing an intrusion on an individual device, like a connected embedded or IoT system?