Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Industry Insights
Partners
Careers
Contact
Home
Team
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Industry Insights
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 19/03/2026
Mapping the Supply Chain: A Faster Path to Organizational Resilience
In this episode of Shielded, Jo Lintzen speaks to Sarah McCarthy, Quantum Readiness Program Lead at Citi, who shares how Citi's quantum readiness program has evolved since 2022. They discuss supply chain readiness, and why the first step toward quantum safety does not require a dedicated team or advanced algorithms.
| 18/03/2026
Solution Brief: PQMicroLib-Core for PQC Secure Boot in less than 5 KB of RAM
This Brief explains how PQShield PQMicroLib-Core enables a pure-software, OTA-deployable transition to Post-Quantum Secure Boot. PQShield’s ultra-small cryptographic library, PQMicroLib-Core is specifically designed to add quantum resilience to early boot and ROM stages. Read more.
| 18/03/2026
Solution Brief: Drop-in Post-Quantum TLS for embedded devices with PQMicroLib-Core
This Brief explains how PQShield delivers a standards-based drop-in PQC TLS stack built on PQMicroLib-Core (PQC algorithms), PSA Crypto APIs (portable and interoperable abstraction) and MbedTLS (TLS protocol layer and certificate management). Read more.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 01/04/2026
Japan’s Quantum Leap: Unlocking PQC at Scale with PQShield and CRYPTREC
Today marks a massive milestone for Japan’s digital sovereignty. Following PQShield’s comprehensive evaluation of the ML-KEM algorithm for CRYPTREC (Japan’s cryptographic standardization body), the gates are officially open for quantum-safe deployment across the country’s government procurement and technology supply chains.
30/03/2026
High-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM
This paper details how to protect FrodoKEM against physical side-channel attempts. The authors provide a new, protected implementation for embedded chips and use hardware testing to prove it successfully thwarts these real-world attacks.
| 19/03/2026
Mapping the Supply Chain: A Faster Path to Organizational Resilience
In this episode of Shielded, Jo Lintzen speaks to Sarah McCarthy, Quantum Readiness Program Lead at Citi, who shares how Citi's quantum readiness program has evolved since 2022. They discuss supply chain readiness, and why the first step toward quantum safety does not require a dedicated team or advanced algorithms.
| 18/03/2026
Solution Brief: PQMicroLib-Core for PQC Secure Boot in less than 5 KB of RAM
This Brief explains how PQShield PQMicroLib-Core enables a pure-software, OTA-deployable transition to Post-Quantum Secure Boot. PQShield’s ultra-small cryptographic library, PQMicroLib-Core is specifically designed to add quantum resilience to early boot and ROM stages. Read more.
| 18/03/2026
Solution Brief: Drop-in Post-Quantum TLS for embedded devices with PQMicroLib-Core
This Brief explains how PQShield delivers a standards-based drop-in PQC TLS stack built on PQMicroLib-Core (PQC algorithms), PSA Crypto APIs (portable and interoperable abstraction) and MbedTLS (TLS protocol layer and certificate management). Read more.
| 18/03/2026
Solution Brief: PQMicroLib-Core-for-SCA-Protected-Post-Quantum-Keys-in-Embedded-Devices
This Brief explains how PQShield delivers DPA-protected solutions to defend long-lived PQC secrets against physical attacks. PQMicroLib-Core Edge Grade is designed for exposed, embedded environments. Read more.
| 15/03/2026
Why AI is accelerating both attackers and defenders: From MWC Barcelona
In this episode of Shielded, Jo Lintzen speaks with two experts at Mobile World Conference in Barcelona. Amidst the buzz of the industry being in one place, they discuss the security landscape in the AI era.
| 06/03/2026
Your Inventory Dashboard is Not a Migration Strategy
In this episode of Shielded we speak with Stefan Kölbl, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.
|
| 04/03/2026
Jazzline: Composable CryptoLine functional correctness proofs for Jasmin programs
This paper introduces a way to bridge the gap between high-level logic and low-level hardware verification in cryptographic programming.
| 23/02/2026
A search to distinguish reduction for the isomorphism problem on direct sum lattices
This is paper is concerned with the theoretical basis of lattice-based cryptography, clarifying how “easy” distinguishing attacks relate to “hard” search attacks used in security proofs.
| 06/02/2026
Post-Quantum Negligence: When Inaction Becomes Legal Exposure
In this episode of Shielded, Jo speaks to Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector.
| 26/01/2026
A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform
In this paper, we present a simpler, more efficient way to create a secure, quantum-resistant shared "vault" (a threshold KEM) without using overly complex or slow mathematical tools. It's achieved by combining established cryptographic frameworks with a new, proven mathematical assumption called Coset-Hint-MLWE. The result is a highly secure system that is easier to implement and more practical for real-world use than previous versions.
1
2
3
…
14