Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 27/03/2025
Episode 2: The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team
Quantum risk is a business risk—and Signal Messenger isn’t waiting for quantum computers to arrive. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen welcomes Rolfe Schmidt, Research Engineer at Signal Messenger, to explore how one of the world's most privacy-focused messaging platforms implemented post-quantum cryptography—even with a lean team.
| 24/03/2025
Formal Verification – why does it matter for PQC?
Formal verification has become increasingly important in the realm of cryptographic primitives, which serve as the foundational elements of secure communication systems. As cryptographic algorithms underpin the confidentiality, integrity, and authenticity of digital information, any flaw in their implementation can lead to catastrophic security breaches.
| 18/03/2025
Episode 1: Inside Cloudflare’s Post-Quantum Journey: Bas Westerbaan on Real-World Implementation
Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 01/05/2023
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
This work presents field-programmable gate array (FPGA) implementations and carefully worked out optimizations of four Round-3 finalists in the NIST standardization process
| 23/03/2023
A 334 μW 0.158 mm² ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication
We demonstrate that a memory-efficient striding Toom–Cook with lazy interpolation results in a highly compact, low-power implementation, which, on top, enables a very regular memory access scheme.
| 29/01/2023
Comparing Key Rank Estimation Methods
Recent works on key rank estimation methods claim that algorithmic key rank estimation is too slow, and suggest two new ideas.
| 29/11/2022
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
| 11/11/2022
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
Secure group messaging (SGM) protocols allow large groups of users to communicate in a secure and asynchronous manner.
| 13/10/2022
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
Blind signatures, proposed by Chaum (CRYPTO’82), are interactive protocols between a signer and a user, where a user can obtain a signature without revealing the message to be signed.
| 07/09/2022
Secure Messaging in a Post-Quantum World
Team PQShield experts outline how PQC can be applied to secure messaging in a two-party setting, typically between mobile devices, as well as the specific performance and data requirements.
| 09/08/2022
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
We discuss how to apply ISO 17825 to hardware modules that implement lattice-based PQC standards for public-key cryptography. We find that simple “random key” vs. “fixed key” tests are unsatisfactory due to the close linkage between public and private components of PQC keypairs.
| 22/06/2022
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful
NIST SP 800–22, describes 15 statistical tests and suggests that they can be used to evaluate random and pseudorandom number generators in cryptographic applications. The Chinese standard GM/T 0005–2012 describes similar tests. These documents have not aged well. The weakest pseudorandom number generators will easily pass these tests, promoting false confidence in insecure systems.
| 22/06/2022
More efficient, provably-secure direct anonymous attestation from lattices
The Cloud-Edges (CE) framework, wherein small groups of Internet of Things (IoT) devices are serviced by local edge devices, enables a more scalable solution to IoT networks.
| 14/02/2022
On Entropy and Bit Patterns of Ring Oscillator Jitter
We show how to evaluate entropy, autocorrelation, and bit pattern distributions of thermal jitter ring oscillator noise sources, even with low jitter levels or some bias.
| 06/01/2022
Development of the RISC-V entropy source interface
The RISC-V true random number generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the entropy source (ES) component away from cryptographic DRBGs.
1
…
5
6
7
8
9
10