Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 27/03/2025
Episode 2: The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team
Quantum risk is a business risk—and Signal Messenger isn’t waiting for quantum computers to arrive. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen welcomes Rolfe Schmidt, Research Engineer at Signal Messenger, to explore how one of the world's most privacy-focused messaging platforms implemented post-quantum cryptography—even with a lean team.
| 24/03/2025
Formal Verification – why does it matter for PQC?
Formal verification has become increasingly important in the realm of cryptographic primitives, which serve as the foundational elements of secure communication systems. As cryptographic algorithms underpin the confidentiality, integrity, and authenticity of digital information, any flaw in their implementation can lead to catastrophic security breaches.
| 18/03/2025
Episode 1: Inside Cloudflare’s Post-Quantum Journey: Bas Westerbaan on Real-World Implementation
Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 07/10/2024
Video 5 – No can to kick down the road – it’s all about compliance
In this video, Ben and Ali discuss compliance, particularly as industry builds around the certifications for PQC.
| 07/10/2024
Video 6 – Post-quantum is an era
In this video, Ali and Ben discuss some of the wider pieces of cryptography, many of which are not vulnerable to the quantum threat, but form essential components nevertheless, in the ‘post-quantum’ era.
| 07/10/2024
Video 7 – Is it time to stop talking about PQC?
In this clip, Ben and Ali discuss the terminology of ‘post-quantum’. Is it still relevant? Is it misleading?
| 07/10/2024
Video 8 – PQC in silicon
In this clip, Ben and Ali talk about PQShield’s silicon implementation of PQC – showing that we haven’t just designed PQC solutions, we’ve actually built our hardware IP onto a physical chip!
| 07/10/2024
Video 9 – Standardization – what’s next?
In this video, Ben and Ali discuss NIST’s timeline, including FALCON, Round 4 KEMs, the necessary mix of lattice, code-based and hash algorithms, as well as the ongoing effort to select digital signatures.
| 16/09/2024
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
This work explores several architectural optimizations and proposes a high-performance and area-time (AT) product efficient hardware accelerator for Kyber.
| 16/09/2024
Masking the GLP Lattice-Based Signature Scheme at Any Order
In this paper, we describe the first masked implementation of a lattice-based signature scheme.
| 16/09/2024
Anonymous Reputation Systems with Revocation, Revisited
In this work, we revisit ARS. Our contributions are threefolds: First, we show that all previous definitions of ARS allow the users’ purchase history to leak.
| 16/09/2024
Compact NIZKs from Standard Assumptions on Bilinear Maps
The main focus of this work is on exploring short pairing-based NIZKs for all NP languages based on standard assumptions.
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.
| 16/09/2024
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
This paper presents Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures.
1
2
3
4
5
…
10