Cryptography Research, Inc. Expands Team to Meet Increasing Demand for Embedded Systems Security

SAN FRANCISCO, California — February 14, 2007 — Cryptography Research, Inc. (CRI) today announced the appointment of Luke Teyssier to senior staff engineer. In response to growing demand for embedded systems security, Teyssier joins the company’s world class engineering team and will help design security systems for high-threat environments, analyze product vulnerabilities and develop countermeasures to mitigate threats.

“As attacks targeting embedded systems become more prevalent, Luke’s deep technical knowledge and experience with building and testing embedded systems will bring increased value to CRI’s customers and reinforce our reputation as a leader in this critical area,” said Paul Kocher, president and chief scientist at CRI.

Prior to joining CRI, Teyssier worked for Electromagnetic Systems Laboratory (A TRW subsidiary), Wind River Systems, Embedded Wizardry and Texas Instruments. Teyssier helped develop and launch several dozen embedded systems, including such industry milestones as the first VoIP speaker phone, the first wireless Web browser, the first Java graphical browser desktop phone, an automated electronic defibrillator and a $500 million signal processing system. He has also built field programmable gate array (FPGA)-based protocol analyzers and diagnostic fixtures for wireless modules. Teyssier is a member of the Institute of Electrical and Electronics Engineers (IEEE) and the Association for Computing Machinery (ACM). He holds a bachelor’s degree in computer science from California Polytechnic State University, San Luis Obispo.

“CRI’s engineering staff is comprised of some of the industry’s top minds, and I look forward to leveraging my skills and experience to help the company continue to develop solutions to complex security challenges,” said Teyssier. “Embedded systems must withstand an increasing number and range of targeted attacks. At CRI, I will have the opportunity to apply creativity and originality to construct systems that can defend against—and recover from—these attacks.”