Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 23/10/2025
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
In this episode of Shielded, Jo Lintzen speaks with Dr. Richard Searle, Chief AI Officer at Fortanix, about how confidential computing and a software-first model accelerate the shift to post-quantum cryptography.
| 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library in PQCryptoLib-SDK, for resilient post-quantum algorithms.
| 09/10/2025
No-Regrets Migration: Why PKI Should Be Your First Move
In this episode of Shielded, Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 11/08/2021
An Instruction Set Extension to Support Software-Based Masking
In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA).
| 09/07/2021
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
This paper introduces a new framework for the composition of probing-secure circuits.
| 11/05/2021
SoK: How (not) to Design and Implement Post-quantum Cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. We systematize the current state of knowledge on post-quantum cryptography.
| 01/05/2021
Exact Lattice Sampling from Non-Gaussian Distributions
We propose a new framework for (trapdoor) sampling over lattices.
| 20/03/2021
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort.
| 15/02/2021
Quantum Computing Threat: NIST PQC standards are here… how can you keep ahead?
Cryptographic agility and a clear roadmap to the NIST standards are key to a smooth and secure transition to PQC.
| 15/02/2021
Quantum Computing Threat: An Overview of Post-Quantum Cryptography
The goal of this document is to provide the reader with an understanding of the key technical ideas used in post‐quantum cryptography.
| 15/02/2021
Quantum Computing Threat: The First NIST Post-Quantum Cryptographic Standards
In 2016, the National Institute of Standards and Technology (NIST) launched a open and world‐ wide effort to propose, analyze and eventually standardize post‐quantum cryptographic schemes. In this white paper we find out more.
| 07/12/2020
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications
A multi-recipient key encapsulation mechanism, or mKEM, provides a scalable solution to securely communicating to a large group.
| 03/12/2020
The design of scalar AES Instruction Set Extensions for RISC-V
We survey the state-of-the-art industrial and academic ISEs for AES, implement and evaluate five different ISEs, one of which is novel.
| 14/11/2020
Building a Modern TRNG: An Entropy Source Interface for RISC-V
The currently proposed RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component away from cryptographic PRNGs into a separate interface, and in its use of polling. We describe the interface, its use in cryptography, and offer additional discussion, background, and rationale for various aspects of it.
| 05/10/2020
ModFalcon: Compact Signatures Based On Module-NTRU Lattices
We introduce a new family of signature schemes based on the falcon design, which relies on module lattices. Our concrete instantiation enjoys the compactness and efficiency of falcon, and allows an intermediate security level.
1
…
9
10
11
12
13