Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 06/11/2025
No-Regrets Migration: Why PKI Should Be Your First Move
Hardware defines trust. If its cryptography fails, no amount of software protection can recover it. In this episode of Shielded, Jo Lintzen speaks with Thalia Laing, Principal Cryptographer at HP.
| 23/10/2025
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
In this episode of Shielded, Jo Lintzen speaks with Dr. Richard Searle, Chief AI Officer at Fortanix, about how confidential computing and a software-first model accelerate the shift to post-quantum cryptography.
| 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library in PQCryptoLib-SDK, for resilient post-quantum algorithms.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 07/10/2024
Video 8 – PQC in silicon
In this clip, Ben and Ali talk about PQShield’s silicon implementation of PQC – showing that we haven’t just designed PQC solutions, we’ve actually built our hardware IP onto a physical chip!
| 07/10/2024
Video 9 – Standardization – what’s next?
In this video, Ben and Ali discuss NIST’s timeline, including FALCON, Round 4 KEMs, the necessary mix of lattice, code-based and hash algorithms, as well as the ongoing effort to select digital signatures.
| 16/09/2024
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
This work explores several architectural optimizations and proposes a high-performance and area-time (AT) product efficient hardware accelerator for Kyber.
| 16/09/2024
Masking the GLP Lattice-Based Signature Scheme at Any Order
In this paper, we describe the first masked implementation of a lattice-based signature scheme.
| 16/09/2024
Anonymous Reputation Systems with Revocation, Revisited
In this work, we revisit ARS. Our contributions are threefolds: First, we show that all previous definitions of ARS allow the users’ purchase history to leak.
| 16/09/2024
Compact NIZKs from Standard Assumptions on Bilinear Maps
The main focus of this work is on exploring short pairing-based NIZKs for all NP languages based on standard assumptions.
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.
| 16/09/2024
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
This paper presents Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures.
| 16/09/2024
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
The main purpose of this work is to raise awareness about a primitive that can provide large efficiency gains in post-quantum cryptography: multi-recipient KEMs, ormKEMs.
| 16/09/2024
Optimizations and Practicality of High-Security CSIDH
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange.
| 16/09/2024
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
In this work, we present two round-optimal blind signatures under standard assumptions in the ROM with different approaches: one achieves the smallest sum of the signature and communication sizes, while the other achieves the smallest signature size.
1
…
4
5
6
7
8
…
13