Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 29/09/2025
Quantum Secure Key Management: PQShield and Cryptomathic’s CrystalKey360
This joint Guide with Cryptomathic outlines the critical challenges driving a major evolution in cryptographic key management, namely the threat of quantum computing and the growing complexity of multi-cloud environments
| 26/09/2025
Complacency, Not Quantum, Is the Real Threat: Mike Silverman on Why Crypto-Agility Can’t Wait
In this episode of Shielded: Jo speaks to Mike Silverman, Chief Strategy & Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security.
| 26/06/2025
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
In this episode of Shielded, we are joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
| 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2025?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 14/08/2024
CV2EC: Getting the Best of Both Worlds
Converting CryptoVerif models to EasyCrypt: getting the best of both worlds.
| 31/07/2024
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types now available, each offering different tradeoffs. However, one property that has remained elusive is adaptive security.
| 31/07/2024
Flood and submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
We propose a new framework based on random submersions for constructing verifiable short secret sharing and showcase it to construct efficient threshold lattice-based signatures in the hash-and-sign paradigm, when based on noise flooding.
| 31/07/2024
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
In this work, we construct the first efficient two-round lattice-based threshold signature without relying on FHE or HTDC.
| 18/07/2024
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. (journal version)
| 17/07/2024
Post-Quantum Secure Boot for Processors and FPGAs
This whitepaper summarises the current state of the PQC standards and the governmental regulations. It especially highlights the US Commercial National Security Algorithm Suite (CNSA) 2.0 which mandates software/firmware1 signing to use quantum-safe signatures as the default option by 2025, and as the only option by 2030.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
| 23/04/2024
Side-channel analysis: why it matters?
Side-channel attacks are a physical type of threat that aims to recover sensitive data manipulated by your code without using cryptanalysis, or taking advantage of software vulnerabilities.
1
…
5
6
7
8
9
…
13