Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2024?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 24/03/2025
Formal Verification – why does it matter for PQC?
Formal verification has become increasingly important in the realm of cryptographic primitives, which serve as the foundational elements of secure communication systems. As cryptographic algorithms underpin the confidentiality, integrity, and authenticity of digital information, any flaw in their implementation can lead to catastrophic security breaches.
| 18/03/2025
Episode 1: Inside Cloudflare’s Post-Quantum Journey: Bas Westerbaan on Real-World Implementation
Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges.
| 27/02/2025
A comparative analysis of open-source and commercial PQC solutions
In this article, we’ll explore some of the key considerations to be made when it comes to the comparison of open source with commercially-licensed IP.
| 18/02/2025
Identity and payments: preparing for the quantum threat
With the world relying increasingly on digital payments, online authorization, and cloud-based access, we need cryptography to be smarter and more prescient than ever.
| 30/01/2025
Recursive Lattice Reduction
We propose a recursive lattice reduction framework for finding short non-zero vectors or dense sublattices of a lattice.
| 30/01/2025
A Tight Security Proof for SPHINCS+, Formally Verified
In this work, we formally prove a tight security bound for SPHINCS+ using the EasyCrypt proof assistant, establishing greater confidence in the general security of the scheme and that of the parameter sets considered for standardization.
| 03/01/2025
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring signature) from isogeny and lattice assumptions.
| 03/01/2025
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
In this work we prove lower bounds on the (communication) cost of maintaining a shared key among a dynamic group of users. Being "dynamic'' means one can add and remove users from the group.
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.
| 26/11/2024
Open-source or commercial PQC libraries: How do I choose?
In this video, Ben Packman, PQShield's Chief Strategy Officer talks with our Senior Product Manager, Michele Sartori about some of the key differences between open-source and closed-source solutions for post-quantum cryptography.
| 26/11/2024
Post-quantum cryptography and secure boot
In this video, Axel Y Poschmann, PQShield's VP of Product and Ben Packman, Chief Strategy Officer discuss some of the current issues around deploying post-quantum secure boot.
| 26/11/2024
PQShield: at the heart of the PQC conversation
Team PQShield includes some incredible people. We're the largest collaboration of commercially-based post-quantum cryptographers anywhere in the world.
1
2
3
…
10