Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 09/01/2026
How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol
Recent efforts to transition secure messaging to post-quantum standards, like Apple’s PQ3 and Signal’s updated Triple Ratchet, have introduced complex design trade-offs due to the high communication overhead of post-quantum cryptography. This paper introduces a pragmatic metric and experimental framework to compare these protocols, revealing that no "optimal" protocol exists when balancing security against real-world bandwidth constraints. Additionally, the authors propose a new optimization called "opportunistic sending" and a building block termed "sparse continuous key agreement" to improve protocol efficiency.
| 08/01/2026
The End of Static Cryptography: What Leaders Must Understand Now
This special episode of Shielded brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades.
19/12/2025
Subversion-resilient key-exchange in the post-quantum world
This paper enhances subversion-resilient Authenticated Key Exchange (AKE) by using "Reverse Firewalls" to protect protocols against tampered implementations. Key contributions include Flexible Security Framework - a new definition that focuses on restoring specific security properties (authentication and key security) across various levels of compromise, Post-Quantum Readiness: the introduction of re-randomizable Key Encapsulation Mechanisms (KEMs), with implementations based on both Diffie-Hellman and Kyber, and Formal Verification - rigorous validation of the protocol using both traditional computational proofs and the CryptoVerif formal prover.
| 19/12/2025
Confidentiality vs Authentication: How Far the Web Has Actually Moved
In this episode of Shielded Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards.
| 04/12/2025
The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust
In this episode of Shielded, Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice.
| 24/11/2025
Solution brief: PQShield’s PQCryptoLib-SDK and Nexus certificate management solution
The document describes how PQShield's PQCryptoLib-SDK integrates with Nexus Certificate Manager (CM), Nexus's PKI platform, to create a post-quantum ready certificate management and VPN solution.
| 20/11/2025
Inside Microsoft’s Quantum Safe Program: Turning Policy into Practice
In this episode of Shielded, Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice.
| 17/11/2025
Ben Packman joins Web Summit Panel, Lisbon, 13 November 2025
Our CSO Ben Packman speaking at Web Summit, Lisbon November 12:05-12:25 on – "Quantum crossroads: Opportunity and risk in the next computing era."
14/11/2025
Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
How can you prove a private conversation ever happened? In modern secure messaging, the goal is "deniability"—ensuring no one can cryptographically prove you sent a message. This vital privacy feature is core to protocols like Signal's X3DH, but achieving it in a fully post-quantum world has been a major roadblock. A promising path forward involves 'split-KEMs' (a method for establishing secret keys), but previous approaches were too inefficient to be adopted. Our latest research, Sparrow-KEM, solves this efficiency problem. It makes this approach a viable way to upgrade the Signal protocol, making it fully resistant to quantum attackers. The results represent a significant leap forward...
| 06/11/2025
No-Regrets Migration: Why PKI Should Be Your First Move
Hardware defines trust. If its cryptography fails, no amount of software protection can recover it. In this episode of Shielded, Jo Lintzen speaks with Thalia Laing, Principal Cryptographer at HP.
| 23/10/2025
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
In this episode of Shielded, Jo Lintzen speaks with Dr. Richard Searle, Chief AI Officer at Fortanix, about how confidential computing and a software-first model accelerate the shift to post-quantum cryptography.
| 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library.