Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 30/04/2025
Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones
In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late.
| 16/04/2025
Your Cryptography is stuck in 2010 – How to Catch Up | Hart Montgomery
In this episode of Shielded: we speak with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk.
| 03/04/2025
How to Build Your 12-Month Post-Quantum Strategy With NIST’s Dustin Moody
Shielded welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.
| 26/11/2024
Open-source or commercial PQC libraries: How do I choose?
In this video, Ben Packman, PQShield's Chief Strategy Officer talks with our Senior Product Manager, Michele Sartori about some of the key differences between open-source and closed-source solutions for post-quantum cryptography.
| 26/11/2024
Post-quantum cryptography and secure boot
In this video, Axel Y Poschmann, PQShield's VP of Product and Ben Packman, Chief Strategy Officer discuss some of the current issues around deploying post-quantum secure boot.
| 26/11/2024
PQShield: at the heart of the PQC conversation
Team PQShield includes some incredible people. We're the largest collaboration of commercially-based post-quantum cryptographers anywhere in the world.
| 22/11/2024
Post-Quantum Secure Boot for Processors and FPGAs (Japanese)
Read our Post-Quantum Secure Boot for Processors and FPGAs Guide in Japanese.
07/11/2024
Japanese Momentum with PQC
Read our Guides in Japanese: Crypto Modernisation Part 1: Where is your Cryptography? Cryptography Modernization Part 2: Crypto-agility and hybrid schemes
| 07/11/2024
The New NIST Standards are here. What does it mean for PQC in 2024 (Japanese)
Read our NIST Standards Guide in Japanese.
| 06/11/2024
Quantum Security For Automotive
The next generation of cybersecurity threats has become a concern within the automotive sector, particularly when it comes to the power of quantum computers.
| 15/10/2024
The Financial Market’s Transition to Post-Quantum Cryptography
This whitepaper, in conjunction with Quant-X, summarizes the current state of the PQC standards and the governmental regulations, outlines generic financial market specific threats that can be mitigated by post-quantum cryptography.
08/10/2024
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
Masking schemes are key in thwarting side-channel attacks due to their robust theoretical foundation. Transitioning from Boolean to arithmetic (B2A) masking is a necessary step in various cryptography schemes.
| 08/10/2024
High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSA
This work presents a novel architecture of a high-performance NTT accelerator capable of performing both NTT and inverse NTT operations using a single set of hardware resources.
| 07/10/2024
Video 1 – Algorithims are just recipes
The release of the new NIST standards is a great achievement but as Ali and Ben discuss in this recent video, algorithms are really only recipes – the key is how you use them.
1
2
3
4
…
10