On our website, we would like to use the services of third-party providers who help us improve our promotional offerings (marketing), evaluate the use of our website (performance) and adapt the website to your preferences (functionality). We need your consent for the use of these services; you can always revoke this consent. You can find information about the services and the chance to reject them under “User-defined.” You can find additional information in our Data Protection Policy.

2 - 4 March 2021 // Nuremberg, Germany

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products embedded world 2020
Zoom Image LOGO_esDynamic




Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Securing a system requires cryptography. Cryptography is therefore at the heart of all systems to handle encryption, authentication, integrity. To achieve this, different types of cryptographic algorithms are implemented in the systems, whose security relies on a strong confidentiality and integrity of the related secret keys. When embedded on devices, cryptographic algorithms can be subject to side-channel and Fault-Injection attacks. Such attacks have shown their efficiency to compromise secret keys and therefore affect the whole system security..  After years of research in that field, many attack variants have been found. They are complex. They exploit both physical measurements and scientific computations.

At eShard we passionately believe that security analysis experts deserve to work more efficiently. We recognize that the commercial tools available and most in-house developed solutions are not suitable for flexible, collaborative and efficient working. And, we know, the importance of secure cryptography implementations is growing every day as we come to rely more and more on mobile and connected products and services for our every-day tasks. So we have designed and developed the industry-defining cybersecurity platform built on a data science platform that empowers your experts to identify, manage and solve security challenges in mobile and connected devices.

This platform is called esDynamic. It is a scientific development platform for security analysis that has been specifically designed for your talented experts to work using tools and modules to complete tests and analyses as well as profiting from built-in knowledge share, ease of use, collaboration tools and bespoke online learning modules. The platform also delivers internal efficiencies and de-risks people movement. Every analysis is recorded, enabling a review of steps during a test, enabling multiple team members to follow and learn methods and techniques. Hard learnt expertise stays even if the people leave.

At its core, esDynamic is a web application platform. Access the core platform and add from a wide selection of tools and modules that match your needs. Within the module, you will find executable knowledge tutorials that empower experts to start to conduct and complete tests and analyses. Activity notebooks and use cases help you to further accelerate your team learning. Record and store every test, enabling you to review and share across countries and continents with remote teams whenever you need to, ensuring you are constantly up-to-date, always learning and up-skilling and de-risking people movement. Collaboration is possible. You can also create your tests and modules, bespoke to you within the platform that solve challenges you face. So, from initial tests to creating bespoke programmes of work, esDynamic will keep delivering as you keep developing.

The philosophy of the platform is “You are the expert and we allow you to control and expand your competences”. By design, you have the full control, own your intellectual property and share your knowledge securely within your organisation. You can develop on the notebooks, create your libraries and connect to any types of equipment. Additionally, eShard provide a repository of the latest state of art attacks that are described and implemented so that you can execute and reproduce straight away. Finally, since the underlying technology is using Python library from data science, this is a good fit for vectorised computations and esDynamic is today the most performant security analysis platform.

esDynamic is assigned to following product groups:


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.