RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL Lightweight SSL in 20 kB with Lean PSK

Are you interested in using the wolfSSL embedded SSL library in an extremely resource constrained environment? If so, you may be interested to hear that we have recently implemented a wolfSSL “Lean PSK” build which enables the wolfSSL library to be built with a footprint size of 20kB! The “Lean PSK” build requires the use […]

Read MoreMore Tag

CyaSSL Competitive Upgrade Program

One of the services that yaSSL provides is the CyaSSL Competitive Upgrade Program. With this program, yaSSL offers competitive upgrade pricing for those who wish move from an outdated, orphaned, or overpriced SSL library to the CyaSSL embedded SSL library with low cost and minimal disturbance to their code base. Here’s an outline of the […]

Read MoreMore Tag

Security on Freescale Kinetis MQX with wolfSSL

Hello Kinetis users!   Our team has now ported and released wolfSSL lightweight SSL for Freescale Kinetis.  The newest work is for MQX/RTCS/MFS on Kinetis tower systems.  Check our Github repository for the most recent source code: https://github.com/cyassl/cyassl If you are a Kinetis user, you will also be pleased to know that we support FreeRTOS, […]

Read MoreMore Tag

yaSSL Embedded Web Server SafeRTOS Port

Have you been searching for a web server that runs on SafeRTOS? We recently ported the yaSSL Embedded Web Server and wolfSSL embedded SSL library to the SafeRTOS operating system. This means that you can easily serve up HTTPS content from your SafeRTOS-enabled project. The yaSSL Embedded Web Server offers a very small footprint, with […]

Read MoreMore Tag

Good article on potential SHA-3 (aka Keccak) use in embedded systems

Here`s a good article if you`re wondering how SHA-3 will be used:  http://community.embeddedswstore.com/t5/Embedded-Connection/Why-Does-Embedded-Security-Get-Overlooked/ba-p/286 From the article: “What then will SHA-3 be good for? While Polk says it may take years to identify all the possibilities for Keccak, it immediately provides an essential insurance policy in case SHA-2 is ever broken. He also speculates that the […]

Read MoreMore Tag

NIST selects Keccak for SHA-3

On October 12, NIST announced Keccak as the winner of its Secure Hash Algorithm (SHA-3) competition. Keccak is designed to permute the data in a different manner than MD5, SHA-1, and SHA-2, making it immune to many of the attacks on those hashes. It promises roughly 13 cycles per byte to process the hash. The […]

Read MoreMore Tag

Posts navigation

1 2 3 191 192 193 194 195 196 197 215 216 217

Weekly updates

Archives