Custom Developments

Advanced cryptographic implementations running natively inside the NXP JCOP 4.5 P71 secure element — secret keys never leave the chip.

Implementation Showcase

Cryptographic Projects Examples

Production-grade algorithms implemented in JavaCard and/or C — running inside certified hardware with no key exposure.

RedDSA Pallas (Zcash Orchard) Signatures

RedDSA / Pallas (Zcash Orchard) Signatures

Privacy-preserving SpendAuth signatures over the Pallas curve for Zcash’s Orchard shielded protocol — enabling NU5-compliant shielded transactions from a certified secure element.

Used by

Zcash Orchard NU5 — shielded transactions

Curve

Pallas (Pasta curve family)

icon2
icon3
icon4

BLS12-381 Signatures

Full BLS signature scheme over the BLS12-381
pairing-friendly elliptic curve — enabling
threshold signatures, aggregation, and
Ethereum 2.0 validator operations with
hardware-level security.

Key sizes

48-byte public keys · 96-byte signatures

Architecture

Split host/card — 6.4× speedup

icon2
RedDSA Pallas (Zcash Orchard) Signatures
icon3
icon5

Exotic Hash Functions

Non-standard hash algorithms implemented natively on the secure element — enabling zero-knowledge and blockchain-native cryptographic operations without exposing keys.

Algorithms

Keccak-256
BLAKE2b-512
BLAKE2s-256
Poseidon-Stark252
Poseidon-Mina/Kimchi

Non-Negotiable

Security Guarantees

Every implementation adheres to the same uncompromising security model — by design, not by configuration.

Overlay+Border
Keys Never Leave the Secure Element

Secret material is generated and used entirely within the NXP P71 hardware boundary.

Overlay+Border-1

Constant-Time Operations

Secret material is generated and used entirely within the NXP P71 hardware boundary.

Overlay+Border-2

Mandatory Input Validation

Secret material is generated and used entirely within the NXP P71 hardware boundary.

Overlay+Border-3

Phase State Machines

Secret material is generated and used entirely within the NXP P71 hardware boundary.

Overlay+Border-4

Common Criteria Certified Hardware

Secret material is generated and used entirely within the NXP P71 hardware boundary.

Interested in these projects or custom developments?

We’d love to hear from you. Whether you need an existing
implementation or something entirely new — let’s talk.