Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Industry Insights
Partners
Careers
Contact
Home
Team
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Industry Insights
Events
Partners
Careers
Explainer articles
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 08/05/2026
Moving From Awareness To Action: The Board’s Role In Organizational Resilience
| 16/04/2026
RSA Conference 2026: Views on quantum-safe migrations
In this episode of Shielded, Jo Lintzen speaks with Aisling Dawson, Senior Analyst at ABI Research, and Itan Barmes, Chief Strategy Officer at Qiz Security, live from RSA Conference 2026.
| 09/04/2026
Breaking Silos: Resilience as a Cross-Functional Mandate
In this episode of Shielded:, Jo speaks with Carolina Polito, a researcher at the Center for European Policy Studies and a PhD candidate in international relations.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 04/09/2025
The Next Chapter in Securing the World’s Internet
What does it take to keep the world’s most widely used cryptographic library secure in the quantum era? We welcome Tomáš Mráz, Director of the OpenSSL Software Foundation, and Jon Ericson, Community Manager.
| 28/08/2025
Post-Quantum Prep Without the Panic: Don’t Delay Your Upgrade to TLS 1.3
What if quantum computing feels years away, but your migration to post-quantum cryptography needs to start today? In this episode of Shielded we welcome Kevin Hilscher, Senior Director of Product Management at DigiCert.
| 21/08/2025
Designing for Breakage: What Cybersecurity Leaders Must Plan For
In this episode of Shielded, we welcome Yolanda Reid, former IBM Consulting leader and U.S. defense veteran, to explain why PQC is not a patch, but a permanent shift in how we secure systems, train teams, and think about risk.
| 14/08/2025
From NIST Standards to Action: A Year of PQC Migration
In this special episode of Shielded, we revisit those early conversations about PQC migration to see how far we’ve come since the NIST standards were introduced a year ago.
| 10/08/2025
Continuous Group-Key Agreement: Concurrent Updates without Pruning
Continuous Group Key Agreement (CGKA) is the primitive underlying secure group messaging. It allows a large group of N users to maintain a shared secret key that is frequently rotated by the group members in order to achieve forward secrecy and post compromise security.
| 10/08/2025
Hardware Is the Hidden Risk: Ferhat Yaman on PQC, Side-Channel Attacks, and AI Privacy
We meet Ferhat Yaman, a security researcher at AMD’s Product Security Office, to explore the front lines of post-quantum cryptography, hardware vulnerabilities, and AI privacy.
| 17/07/2025
Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol
In this work, we propose TRaccoon-IA, a TRaccoon with an efficient identifiable abort protocol, allowing to identify malicious signers when the signing protocol fails.
| 17/07/2025
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures
We analyze Signal's classically secure X3DH and harvest-now-decrypt-later-secure PQXDH, and show the settings for which PQXDH is (un)deniable against harvest-now--later attacks..and more.
| 17/07/2025
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable
In this work, we focus on the authenticity of the application messages exchanged in MLS.
| 17/07/2025
Bundled Authenticated Key Exchange: A Concrete Treatment of Signal’s Handshake Protocol and Post-Quantum Security
In this work, which was accepted at USENIX Security 2025, we propose a new way of modeling Signal handshake protocols.
| 17/07/2025
The biggest risk to PQC migration is you (and other humans)
What if the biggest threat to your cybersecurity strategy isn’t quantum computing, but humans? In this episode of Shielded, we welcome Professor Bill Buchanan, OBE, FRSE, a global leader in applied cryptography, digital trust, and secure system design.
| 15/07/2025
More Efficient Protocols for Post-Quantum Secure Messaging
More Efficient Protocols for Post-Quantum Secure Messaging is a talk presented by Thomas Prest at RWC 2024. This was the third talk in a session on post-quantum messaging, chaired by Dan Boneh.
1
2
3
4
5
6
…
15