Team PQShield
Products
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Partners
Careers
Contact
Home
Team PQShield
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2024?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
Show All
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Videos
Best Paper
Research Papers
Whitepapers
| 21/07/2023
High-Order Masking of Lattice Signatures in Quasilinear Time
We design a lattice-based signature scheme specifically for side-channel resistance and optimize the masked efficiency as a function of the number of shares.
| 30/05/2023
Cryptography Modernization Part 1: Where is your Cryptography?
A plain english guide to help you get ready to comply with the new cryptography standards.
| 23/05/2023
Signature for Objects: Formalizing How to Authenticate Physical Data and More
This paper proposes a new concept called signatures for objects to guarantee the integrity of objects cryptographically.
| 02/05/2023
A Key-Recovery Attack Against Mitaka in the t-Probing Model
We uncover a flaw in the security proof of MITAKA, and subsequently show that it is not secure in the t-probing model.
| 02/05/2023
Zero-Knowledge Arguments for Subverted RSA Groups
This work investigates zero-knowledge protocols in subverted RSA groups where the prover can choose the modulus and where the verifier does not know the group order.
| 01/05/2023
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
This work presents field-programmable gate array (FPGA) implementations and carefully worked out optimizations of four Round-3 finalists in the NIST standardization process
| 23/03/2023
A 334 μW 0.158 mm² ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication
We demonstrate that a memory-efficient striding Toom–Cook with lazy interpolation results in a highly compact, low-power implementation, which, on top, enables a very regular memory access scheme.
| 29/01/2023
Comparing Key Rank Estimation Methods
Recent works on key rank estimation methods claim that algorithmic key rank estimation is too slow, and suggest two new ideas.
| 29/11/2022
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
| 11/11/2022
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
Secure group messaging (SGM) protocols allow large groups of users to communicate in a secure and asynchronous manner.
| 13/10/2022
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
Blind signatures, proposed by Chaum (CRYPTO’82), are interactive protocols between a signer and a user, where a user can obtain a signature without revealing the message to be signed.
| 07/09/2022
Secure Messaging in a Post-Quantum World
Team PQShield experts outline how PQC can be applied to secure messaging in a two-party setting, typically between mobile devices, as well as the specific performance and data requirements.
1
…
4
5
6
7
8
…
10