Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 06/03/2026
Your Inventory Dashboard is Not a Migration Strategy
In this episode of Shielded we speak with Stefan Kölbl, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.
| | 04/03/2026
Jazzline: Composable CryptoLine functional correctness proofs for Jasmin programs
This paper introduces a way to bridge the gap between high-level logic and low-level hardware verification in cryptographic programming.
| 23/02/2026
A search to distinguish reduction for the isomorphism problem on direct sum lattices
This is paper is concerned with the theoretical basis of lattice-based cryptography, clarifying how “easy” distinguishing attacks relate to “hard” search attacks used in security proofs.
| 06/02/2026
Post-Quantum Negligence: When Inaction Becomes Legal Exposure
In this episode of Shielded, Jo speaks to Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector.
| 26/01/2026
A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform
In this paper, we present a simpler, more efficient way to create a secure, quantum-resistant shared "vault" (a threshold KEM) without using overly complex or slow mathematical tools. It's achieved by combining established cryptographic frameworks with a new, proven mathematical assumption called Coset-Hint-MLWE. The result is a highly secure system that is easier to implement and more practical for real-world use than previous versions.
| 09/01/2026
How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol
Recent efforts to transition secure messaging to post-quantum standards, like Apple’s PQ3 and Signal’s updated Triple Ratchet, have introduced complex design trade-offs due to the high communication overhead of post-quantum cryptography. This paper introduces a pragmatic metric and experimental framework to compare these protocols, revealing that no "optimal" protocol exists when balancing security against real-world bandwidth constraints. Additionally, the authors propose a new optimization called "opportunistic sending" and a building block termed "sparse continuous key agreement" to improve protocol efficiency.
| 08/01/2026
The End of Static Cryptography: What Leaders Must Understand Now
This special episode of Shielded brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades.
19/12/2025
Subversion-resilient key-exchange in the post-quantum world
This paper enhances subversion-resilient Authenticated Key Exchange (AKE) by using "Reverse Firewalls" to protect protocols against tampered implementations. Key contributions include Flexible Security Framework - a new definition that focuses on restoring specific security properties (authentication and key security) across various levels of compromise, Post-Quantum Readiness: the introduction of re-randomizable Key Encapsulation Mechanisms (KEMs), with implementations based on both Diffie-Hellman and Kyber, and Formal Verification - rigorous validation of the protocol using both traditional computational proofs and the CryptoVerif formal prover.
| 19/12/2025
Confidentiality vs Authentication: How Far the Web Has Actually Moved
In this episode of Shielded Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards.
| 04/12/2025
The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust
In this episode of Shielded, Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice.
| 24/11/2025
Solution brief: PQShield’s PQCryptoLib-SDK and Nexus certificate management solution
The document describes how PQShield's PQCryptoLib-SDK integrates with Nexus Certificate Manager (CM), Nexus's PKI platform, to create a post-quantum ready certificate management and VPN solution.
| 20/11/2025
Inside Microsoft’s Quantum Safe Program: Turning Policy into Practice
In this episode of Shielded, Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice.