Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 27/03/2025
Episode 2: The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team
Quantum risk is a business risk—and Signal Messenger isn’t waiting for quantum computers to arrive. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen welcomes Rolfe Schmidt, Research Engineer at Signal Messenger, to explore how one of the world's most privacy-focused messaging platforms implemented post-quantum cryptography—even with a lean team.
| 24/03/2025
Formal Verification – why does it matter for PQC?
Formal verification has become increasingly important in the realm of cryptographic primitives, which serve as the foundational elements of secure communication systems. As cryptographic algorithms underpin the confidentiality, integrity, and authenticity of digital information, any flaw in their implementation can lead to catastrophic security breaches.
| 18/03/2025
Episode 1: Inside Cloudflare’s Post-Quantum Journey: Bas Westerbaan on Real-World Implementation
Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 18/08/2019
Unifying Leakage Models on a Rényi Day
In this work, we provide new strategies to prove the security of masked implementations.
| 07/07/2019
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes.
| 26/06/2019
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme
This research proposes the first fault attack analysis of FALCON and finds its lattice trapdoor sampler is as vulnerable to fault attacks as the GPV sampler used in alternative signature schemes.
| 10/05/2019
Round5: Compact and Fast Post-quantum Public-Key Encryption
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding (RLWR)- based IND-CPA secure public-key encryption scheme.
| 06/04/2019
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm
This work shows how to speed up key generation for NTRU-based algorithms by 100x.
| 17/12/2018
Anonymous Reputation Systems Achieving Full Dynamicity from Lattices
In this work, we revisit the Anonymous Reputation Systems presented by Blömer et al. in (FC’15).
| 12/11/2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Round5 is a Public Key Encryption and Key Encapsulation Mechanism (KEM) based on General Learning with Rounding (GLWR), a lattice problem. We implement Round5 on Cortex M4.
| 01/03/2018
Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
In this work, we affirmatively close the gap between ABS schemes based on bilinear maps and lattices by constructing the first lattice-based ABS scheme for unbounded circuits in the random oracle model.
1
…
8
9
10