Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 29/09/2025
Quantum Secure Key Management: PQShield and Cryptomathic’s CrystalKey360
This joint Guide with Cryptomathic outlines the critical challenges driving a major evolution in cryptographic key management, namely the threat of quantum computing and the growing complexity of multi-cloud environments
| 26/09/2025
Complacency, Not Quantum, Is the Real Threat: Mike Silverman on Why Crypto-Agility Can’t Wait
In this episode of Shielded: Jo speaks to Mike Silverman, Chief Strategy & Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security.
| 26/06/2025
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
In this episode of Shielded, we are joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 11/06/2020
Secure Update Propagation via Set-Homomorphic Signatures
In this document, we propose to use homomorphic signatures to maintain a consistent database across all nodes of distributed network.
| 11/05/2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process.
| 10/05/2020
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats
In this paper, we give techniques to implement Gaussian sampling over general lattices without using FPA. To this end, we revisit the approach of Peikert, using perturbation sampling.
| 29/04/2020
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
In this paper, we propose an FS-style signature scheme, called Lossy CSI-FiSh, constructed using the CSIDH-512 parameters and with a security proof.
| 10/04/2020
Isochronous Gaussian Sampling: From Inception to Implementation
We present a framework for Gaussian sampling that is extremely simple, and it is precisely this simplicity that allowed us to make it easy to implement, provably secure, portable, efficient, and provably resistant against timing attacks.
| 18/08/2019
Unifying Leakage Models on a Rényi Day
In this work, we provide new strategies to prove the security of masked implementations.
| 07/07/2019
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes.
| 26/06/2019
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme
This research proposes the first fault attack analysis of FALCON and finds its lattice trapdoor sampler is as vulnerable to fault attacks as the GPV sampler used in alternative signature schemes.
| 10/05/2019
Round5: Compact and Fast Post-quantum Public-Key Encryption
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding (RLWR)- based IND-CPA secure public-key encryption scheme.
| 06/04/2019
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm
This work shows how to speed up key generation for NTRU-based algorithms by 100x.
| 17/12/2018
Anonymous Reputation Systems Achieving Full Dynamicity from Lattices
In this work, we revisit the Anonymous Reputation Systems presented by Blömer et al. in (FC’15).
| 12/11/2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Round5 is a Public Key Encryption and Key Encapsulation Mechanism (KEM) based on General Learning with Rounding (GLWR), a lattice problem. We implement Round5 on Cortex M4.
1
…
10
11
12
13