Team PQShield
Products
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Partners
Careers
Contact
Home
Team PQShield
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2024?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
Show All
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Videos
Best Paper
Research Papers
Whitepapers
| 03/01/2025
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring signature) from isogeny and lattice assumptions.
| 03/01/2025
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
In this work we prove lower bounds on the (communication) cost of maintaining a shared key among a dynamic group of users. Being "dynamic'' means one can add and remove users from the group.
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.
| 26/11/2024
Open-source or commercial PQC libraries: How do I choose?
In this video, Ben Packman, PQShield's Chief Strategy Officer talks with our Senior Product Manager, Michele Sartori about some of the key differences between open-source and closed-source solutions for post-quantum cryptography.
| 26/11/2024
Post-quantum cryptography and secure boot
In this video, Axel Y Poschmann, PQShield's VP of Product and Ben Packman, Chief Strategy Officer discuss some of the current issues around deploying post-quantum secure boot.
| 26/11/2024
PQShield: at the heart of the PQC conversation
Team PQShield includes some incredible people. We're the largest collaboration of commercially-based post-quantum cryptographers anywhere in the world.
| 22/11/2024
Post-Quantum Secure Boot for Processors and FPGAs (Japanese)
Read our Post-Quantum Secure Boot for Processors and FPGAs Guide in Japanese.
07/11/2024
Japanese Momentum with PQC
Read our Guides in Japanese: Crypto Modernisation Part 1: Where is your Cryptography? Cryptography Modernization Part 2: Crypto-agility and hybrid schemes
| 07/11/2024
The New NIST Standards are here. What does it mean for PQC in 2024 (Japanese)
Read our NIST Standards Guide in Japanese.
| 06/11/2024
Quantum Security For Automotive
The next generation of cybersecurity threats has become a concern within the automotive sector, particularly when it comes to the power of quantum computers.
| 15/10/2024
The Financial Market’s Transition to Post-Quantum Cryptography
This whitepaper, in conjunction with Quant-X, summarizes the current state of the PQC standards and the governmental regulations, outlines generic financial market specific threats that can be mitigated by post-quantum cryptography.
08/10/2024
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
Masking schemes are key in thwarting side-channel attacks due to their robust theoretical foundation. Transitioning from Boolean to arithmetic (B2A) masking is a necessary step in various cryptography schemes.
1
2
3
…
10