DS28C36 authenticator equivalent, deepcover secure authenticator.
*
* ECC-256 Compute Engine
* FIPS 186 ECDSA P256 Signature and Verification
* ECDH Key Exchange with Authentication Prevents Man-in-the-Middle Attacks
*
* IoT Node Crypto-Protection
*
* Accessory and Peripheral Secure Authentication
*
* Secure Storag.
Image gallery