Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 26/06/2025
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
In this episode of Shielded, we are joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments.
| 22/05/2025
Your Hardware Refresh Is a Quantum Deadline with Mamta Gupta, Lattice Semiconductor
In this episode of Shielded, Johannes Lintzen sits down with Mamta Gupta of Lattice Semiconductor to explore how hardware-rooted security must evolve to meet the post-quantum challenge.
| 16/05/2025
HSMs and PQC Migration: Are We There Yet? / RSA
In this special RSA 2025 edition we gather 4 leading voices from the world of hardware security to discuss a cornerstone technology powering the post-quantum migration: the Hardware Security Module (HSM).
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 16/09/2024
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
The main purpose of this work is to raise awareness about a primitive that can provide large efficiency gains in post-quantum cryptography: multi-recipient KEMs, ormKEMs.
| 16/09/2024
Optimizations and Practicality of High-Security CSIDH
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange.
| 16/09/2024
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
In this work, we present two round-optimal blind signatures under standard assumptions in the ROM with different approaches: one achieves the smallest sum of the signature and communication sizes, while the other achieves the smallest signature size.
| 16/09/2024
Antrag: Annular NTRU trapdoor generation
In this paper, we introduce a novel trapdoor generation technique for Prest's hybrid sampler over NTRU lattices.
| 16/09/2024
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
In this paper, we show that Peregrine, one of the candidates in the ongoing Korean post-quantum cryptography competition, is no exception, by demonstrating a practical key recovery attack against it.
| 11/09/2024
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
We present distributed key generation and decryption protocols for an additively homomorphic cryptosystem based on class groups, improving on a similar system proposed by Braun, Damgård, and Orlandi at CRYPTO '23.
| 28/08/2024
Mask Compression: High-Order Masking on Memory-Constrained Devices
In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography.
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
| 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2025?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 14/08/2024
CV2EC: Getting the Best of Both Worlds
Converting CryptoVerif models to EasyCrypt: getting the best of both worlds.
| 31/07/2024
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types now available, each offering different tradeoffs. However, one property that has remained elusive is adaptive security.
1
…
3
4
5
6
7
…
11