Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 16/04/2025
Your Cryptography is stuck in 2010 – How to Catch Up | Hart Montgomery
In this episode of Shielded: we speak with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk.
| 03/04/2025
How to Build Your 12-Month Post-Quantum Strategy With NIST’s Dustin Moody
Shielded welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now.
| 27/03/2025
Episode 2: The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team
In this episode, Johannes Lintzen welcomes Rolfe Schmidt, Research Engineer at Signal Messenger, to explore how one of the world's most privacy-focused messaging platforms implemented PQC.
| 24/03/2025
Formal Verification – why does it matter for PQC?
Formal verification has become increasingly important in the realm of cryptographic primitives, which serve as the foundational elements of secure communication systems. As cryptographic  algorithms underpin the confidentiality, integrity, and authenticity of digital information, any flaw in their implementation can lead to catastrophic security breaches. 
| 18/03/2025
Episode 1: Inside Cloudflare’s Post-Quantum Journey: Bas Westerbaan on Real-World Implementation
In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Cloudflare, to discuss why organizations must act now on post-quantum cryptography.
| 27/02/2025
A comparative analysis of open-source and commercial PQC solutions
In this article, we’ll explore some of the key considerations to be made when it comes to the comparison of open source with commercially-licensed IP.
| 18/02/2025
Identity and payments: preparing for the quantum threat
With the world relying increasingly on digital payments, online authorization, and cloud-based access, we need cryptography to be smarter and more prescient than ever.
| 30/01/2025
Recursive Lattice Reduction
We propose a recursive lattice reduction framework for finding short non-zero vectors or dense sublattices of a lattice.
| 30/01/2025
A Tight Security Proof for SPHINCS+, Formally Verified
In this work, we formally prove a tight security bound for SPHINCS+ using the EasyCrypt proof assistant, establishing greater confidence in the general security of the scheme and that of the parameter sets considered for standardization.
| 03/01/2025
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring signature) from isogeny and lattice assumptions.
| 03/01/2025
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
In this work we prove lower bounds on the (communication) cost of maintaining a shared key among a dynamic group of users. Being "dynamic'' means one can add and remove users from the group.
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.