Embedded technology experts team up to help manufacturers secure pervasive computing devices

MISSISSAUGA, Ontario – (March 7, 2005)– To address the growing demand for secure, smart devices, Certicom Corp. (TSX: CIC), the authority for strong, efficient cryptography, has launched the Certicom Partner Connection. Under the program, Certicom will partner with vendors who specialize in the embedded sector-including operating system, microprocessor and embedded software vendors-to provide developers with comprehensive, interoperable solutions to help them meet the emerging market demands for embedded security.

Inaugural members of the program include Beep Science AS, Eracom Technologies, Freescale Semiconductor, Green Hills Software Inc., Intel Corporation, and Texas Instruments.

"There is a growing demand for secure and reliable information delivery in embedded solutions. As a 20-year veteran of the security industry, Certicom, with its deep crypto expertise, fills this void," said Dan Mender, director of business development, Green Hills Software, Inc., a founding member of the Certicom Partner Connection. "The strength of their elliptic curve cryptography (ECC) and FIPS-Validated modules in combination with our highly secure and reliable INTEGRITY RTOS will solve this difficult challenge facing every embedded vertical market."

Security is fast becoming a critical requirement for embedded devices as their role continues to expand. Whether it is a communications device used in the military, a remote diagnostic device in a car or a consumer electronics product, the phenomenon of pervasive computing is putting more pressure on developers to build security in these devices at a low level. However, several hurdles typically prevent developers from addressing this need quickly: a lack of security expertise, the need for interoperability, and manufacturers' aims to control costs and get their products to market quickly.

"We plan to collaborate with the leading embedded solution vendors so that the heavy lifting of solution design and integration is done before we go to market," said Wendy Moore-Bayley, director, strategic alliances at Certicom. "The Certicom Partner Connection will not only help our customers but also our partners, by allowing them to leverage Certicom's security expertise, with the ultimate goal of securing more design wins for both Certicom and our partners." Partners benefit from the sharing of domain expertise and through joint development, marketing and sales.

The efficiency and strength of ECC give the Certicom technology an edge in the embedded space where strength is paramount and size, processing power and battery constraints are a consideration. Building on that strength, Certicom today announced the Certicom Security Architecture for Embedded, www.certicom.com/embeddedpr.

About Certicom Partner Connection
The Certicom Partner Connection provides members with access to Certicom's embedded security expertise, along with opportunities for joint development, marketing and sales. It is the goal of the program to provide customers with complete embedded solutions that leverage the Certicom Security Architecture, allowing them to get to market quickly and cost-effectively with solutions that have strong and efficient security. Certicom is actively seeking new partners with embedded expertise. For more information, visit www.certicom.com/partners.

About Green Hills Software
Founded in 1982, Green Hills Software, Inc. is the technology leader for real-time operating systems and software development tools for 32- and 64-bit embedded systems. Our royalty-free INTEGRITY® RTOS, velOSity™ microkernel, compilers, MULTI® and AdaMULTI™ Integrated Development Environments and TimeMachine™ debugger offer a complete development solution that addresses both deeply embedded and high-reliability applications. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software on the web at www.ghs.com.

About Certicom 
Certicom Corp. (TSX: CIC) is the authority for strong, efficient cryptography required by software vendors and device manufacturers to embed security in their products. Adopted by the US government's National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography (ECC) provide the most security per bit of any known public key scheme, making it ideal for constrained environments. Certicom products and services are currently licensed to more than 300 customers including Motorola, Oracle, Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985, Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa, ON; Reston, VA; San Mateo, CA; and London, England. Visit www.certicom.com.

For further information, please contact:

For Certicom    
Tim Cox Brendan Ziolo  
ZingPR Certicom Corp.  
(650) 369-7784 (613) 254-9267  
tim@zingpr.com bziolo@certicom.com
Certicom, Security Builder, Security Builder Crypto, Security Builder GSE, Security Builder IPSec, Security Builder Middleware, Security Builder NSE, Security Builder PKI, Security Builder SSL, movianVPN, movianCrypt and movianMail are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.
The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.
This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.