Leading cryptography researchers and industry experts discuss impact of crypto modernization and Suite B and the growing use of ECC in commercial applications

MISSISSAUGA, Ontario - (Sept. 27, 2007) – Certicom Corp. (TSX: CIC) today announced that Dr. Martin Hellman, one of the leading experts on cryptography and co-inventor of public key cryptography, will speak at “ECC: Simply the Best,” the fourth annual Certicom ECC Conference, November 13-15 in Toronto, Canada. Dr. Hellman is Professor Emeritus of Electrical Engineering at Stanford University.

In his keynote address, entitled, “A Fool's Errand: Inventing Public Key Cryptography,” Dr. Hellman will recount his early days in studying cryptography and discovering public key cryptography. He will share with participants what brought him to cryptography; why he disregarded conventional wisdom; the roles of Whitfield Diffie and Ralph Merkle (his co-inventors), RSA, and NSA; and the thought sequence that led to pubic key cryptography.

The Certicom ECC Conference offers a forum for discussing real-world applications of cryptography, evolving security standards and pure mathematics. This year, session speakers will discuss Suite B cryptanalysis; application interoperability; the transition between ECC and RSA; Suite B product applications; ECC applications in electronic commerce, content protection, mobility, wireless networks, RFID and enterprise software; and ECC implementation, optimization and benchmarking.

“We are honored to have one of the true luminaries in cryptography at our conference,” said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. “Martin Hellman will give us a special perspective on today’s security challenges. We look forward to hearing his views on the industry.”
ECC is used in a growing number of industries – ranging from consumer electronics, wireless devices and semiconductors to financial services and government. The U.S. Government (through the National Security Agency's Suite B initiative) has identified ECC-based security mechanisms as the recommended technology for protecting government communications. ECC implementations are used to protect content, securely transmit data and digitally sign documents. The small size of ECC algorithms is the main driver behind its popularity as it provides savings in terms of time, memory, bandwidth, and energy consumption. 
For more information about the Certicom ECC Conference or to register, visit: www.certicom.com/conference2007


Certicom protects the value of content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the global leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, Ontario, Canada with worldwide sales and marketing headquarters in Reston, Virginia and offices in the U.S., Canada, Europe and China. Visit www.certicom.com.

For further information, please contact:

For Certicom
John Conrad
Merritt Group Inc.

Certicom, Certicom ECC Core, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder MCE, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information subject to change.
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Factors which could cause actual results or events to differ materially from current expectations include, among other things: the ability of the Company to successfully implement its strategic initiatives and whether such strategic initiatives will yield the expected benefits; the ability of the Company to develop, promote and protect its proprietary technology security breaches or defects in the Company's products; competitive conditions in the businesses in which the Company participates; changes in consumer spending; the outcome of legal proceedings as they arise; general economic conditions and normal business uncertainty; consolidation in the Company's industry and by its customers; customer preferences towards product offerings; the risk that customers may cancel their contracts with the Company; reliance on a limited number of customers; demand for ECC-based technology; performance of the Company's management team and the Company's ability to attract and retain skilled employees; operating the Company's business profitably; fluctuations in revenue and foreign currency exchange rates; interest rate fluctuations and other changes in borrowing costs; the ability to develop and maintain strategic relationships; and other factors identified under the heading "Risk Factors in the Company's annual information" form dated July 26, 2006 and filed on SEDAR at www.sedar.com.