Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 23/10/2025
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
In this episode of Shielded, Jo Lintzen speaks with Dr. Richard Searle, Chief AI Officer at Fortanix, about how confidential computing and a software-first model accelerate the shift to post-quantum cryptography.
| 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library in PQCryptoLib-SDK, for resilient post-quantum algorithms.
| 09/10/2025
No-Regrets Migration: Why PKI Should Be Your First Move
In this episode of Shielded, Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 07/10/2024
Video 9 – Standardization – what’s next?
In this video, Ben and Ali discuss NIST’s timeline, including FALCON, Round 4 KEMs, the necessary mix of lattice, code-based and hash algorithms, as well as the ongoing effort to select digital signatures.
| 16/09/2024
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
This work explores several architectural optimizations and proposes a high-performance and area-time (AT) product efficient hardware accelerator for Kyber.
| 16/09/2024
Masking the GLP Lattice-Based Signature Scheme at Any Order
In this paper, we describe the first masked implementation of a lattice-based signature scheme.
| 16/09/2024
Anonymous Reputation Systems with Revocation, Revisited
In this work, we revisit ARS. Our contributions are threefolds: First, we show that all previous definitions of ARS allow the users’ purchase history to leak.
| 16/09/2024
Compact NIZKs from Standard Assumptions on Bilinear Maps
The main focus of this work is on exploring short pairing-based NIZKs for all NP languages based on standard assumptions.
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.
| 16/09/2024
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
This paper presents Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures.
| 16/09/2024
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
The main purpose of this work is to raise awareness about a primitive that can provide large efficiency gains in post-quantum cryptography: multi-recipient KEMs, ormKEMs.
| 16/09/2024
Optimizations and Practicality of High-Security CSIDH
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange.
| 16/09/2024
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
In this work, we present two round-optimal blind signatures under standard assumptions in the ROM with different approaches: one achieves the smallest sum of the signature and communication sizes, while the other achieves the smallest signature size.
| 16/09/2024
Antrag: Annular NTRU trapdoor generation
In this paper, we introduce a novel trapdoor generation technique for Prest's hybrid sampler over NTRU lattices.
1
…
4
5
6
7
8
…
13