Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 09/10/2025
No-Regrets Migration: Why PKI Should Be Your First Move
In this episode of Shielded, Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware.
| 29/09/2025
Quantum Secure Key Management: PQShield and Cryptomathic’s CrystalKey360
This joint Guide with Cryptomathic outlines the critical challenges driving a major evolution in cryptographic key management, namely the threat of quantum computing and the growing complexity of multi-cloud environments
| 26/09/2025
Complacency, Not Quantum, Is the Real Threat: Mike Silverman on Why Crypto-Agility Can’t Wait
In this episode of Shielded: Jo speaks to Mike Silverman, Chief Strategy & Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 28/08/2024
Mask Compression: High-Order Masking on Memory-Constrained Devices
In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography.
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
| 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2025?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 14/08/2024
CV2EC: Getting the Best of Both Worlds
Converting CryptoVerif models to EasyCrypt: getting the best of both worlds.
| 31/07/2024
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types now available, each offering different tradeoffs. However, one property that has remained elusive is adaptive security.
| 31/07/2024
Flood and submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
We propose a new framework based on random submersions for constructing verifiable short secret sharing and showcase it to construct efficient threshold lattice-based signatures in the hash-and-sign paradigm, when based on noise flooding.
| 31/07/2024
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
In this work, we construct the first efficient two-round lattice-based threshold signature without relying on FHE or HTDC.
| 18/07/2024
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. (journal version)
| 17/07/2024
Post-Quantum Secure Boot for Processors and FPGAs
This whitepaper summarises the current state of the PQC standards and the governmental regulations. It especially highlights the US Commercial National Security Algorithm Suite (CNSA) 2.0 which mandates software/firmware1 signing to use quantum-safe signatures as the default option by 2025, and as the only option by 2030.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
1
…
5
6
7
8
9
…
13