We have established our IP rights in a priority patent application, filed 7 August 2020 by our European Patent Attorney, Julia Gwilt of Appleyard Lees & Co. However, given the continuing developments of our invention, we are reluctant to discuss in detail how we solve the problem of Side Channel Attacks [SCAs]; unless there is a non-disclosure agreement in place.

Our technology is adaptable to any encryption algorithm and can also be applied to running non-encrypting but sensitive programmes, such as financial algorithms. Moreover, our technology can be implemented at different levels of security depending on need. When optimally implemented, it will provide immunity against Wavelet Denoised High-Order Differential Power Analysis. Independent testing has shown that correlation power analysis was unable to find any sub-key of an AES encryption key using a million traces - the full key can typically be gained with 100-180 traces from AES running normally.

Personal funding of the ...
We have established our IP rights in a priority patent application, filed 7 August 2020 by our European Patent Attorney, Julia Gwilt of Appleyard Lees & Co. However, given the continuing developments of our invention, we are reluctant to discuss in detail how we solve the problem of Side Channel Attacks [SCAs]; unless there is a non-disclosure agreement in place.

Our technology is adaptable to any encryption algorithm and can also be applied to running non-encrypting but sensitive programmes, such as financial algorithms. Moreover, our technology can be implemented at different levels of security depending on need. When optimally implemented, it will provide immunity against Wavelet Denoised High-Order Differential Power Analysis. Independent testing has shown that correlation power analysis was unable to find any sub-key of an AES encryption key using a million traces - the full key can typically be gained with 100-180 traces from AES running normally.

Personal funding of the company is "topped up", when necessary; the 20 month runway is on basis that funding will be secured for 1] applying our technology to other encryption algorithms, 2] making relevant patent filings 3] and support active negotiations to licence or sell the technology.

BTW, Incorporation of the company is in England & Wales; not the whole of the United Kingdom.
More information