Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 17/09/2025
PQC vs. QKD: What Matters Now and What Can Wait
In this episode of Shielded, we talk with Will Collison, Interim Global Head of Cryptography at HSBC. Will explains how to separate PQC, QKD, and quantum computing, and why cryptographic agility is the real objective.
| 11/09/2025
3, 5 or 8 Years? The Realistic Timeline for Migration and the Task That Can’t Wait
What if quantum computing feels like a distant threat, but your timeline to prepare is already running out? We welcome Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini.
| 26/06/2025
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
In this episode of Shielded, we are joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 17/07/2025
The biggest risk to PQC migration is you (and other humans)
What if the biggest threat to your cybersecurity strategy isn’t quantum computing, but humans? In this episode of Shielded, we welcome Professor Bill Buchanan, OBE, FRSE, a global leader in applied cryptography, digital trust, and secure system design.
| 15/07/2025
More Efficient Protocols for Post-Quantum Secure Messaging
More Efficient Protocols for Post-Quantum Secure Messaging is a talk presented by Thomas Prest at RWC 2024. This was the third talk in a session on post-quantum messaging, chaired by Dan Boneh.
| 26/06/2025
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
In this episode of Shielded, we are joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments.
| 09/06/2025
Share the MAYO: thresholdizing MAYO
We present the first comprehensive study on thresholdizing practical OV-based signature schemes, specifically focusing on MAYO and UOV.
| 09/06/2025
A reduction from Hawk to the principal ideal problem in a quaternion algebra
In this article we present a non-uniform reduction from rank-2 module-LIP over Complex Multiplication fields, to a variant of the Principal Ideal Problem, in some fitting quaternion algebra.
| 09/06/2025
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes
In this work, we generalize the attack of Mureau et al. against rank-2module-LIP to the family of all number fields with at least one real embedding, which contains the NTRU Prime fields.
| 09/06/2025
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol
Due to the imminent threat of a "Harvest Now, Decrypt Later" attack, secure messaging providers must react know in order to make their protocols : at least as secure as before, but now also post-quantum (PQ) secure.
| 09/06/2025
Finally! A Compact Lattice-Based Threshold Signature
We propose a novel very efficient threshold signature scheme, with a signature size close to that of a single Dilithium signature for any threshold T of at most 8 users.
| 05/06/2025
NCSC proposes its PQC transition timeline to UK Policy makers: guiding the UK to a quantum-safe future
In this episode of Shielded, host Johannes Lintzen sits down with Dr Jeremy Bradley, Principal Technical Director at the UK’s National Cyber Security Centre (NCSC), to explore the UK’s newly released guidance on migrating to post-quantum cryptography.
| 22/05/2025
Your Hardware Refresh Is a Quantum Deadline with Mamta Gupta, Lattice Semiconductor
In this episode of Shielded, Johannes Lintzen sits down with Mamta Gupta of Lattice Semiconductor to explore how hardware-rooted security must evolve to meet the post-quantum challenge.
| 16/05/2025
HSMs and PQC Migration: Are We There Yet? / RSA
In this special RSA 2025 edition we gather 4 leading voices from the world of hardware security to discuss a cornerstone technology powering the post-quantum migration: the Hardware Security Module (HSM).
| 30/04/2025
Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones
In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late.
1
2
3
4
…
12