Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 23/10/2025
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
In this episode of Shielded, Jo Lintzen speaks with Dr. Richard Searle, Chief AI Officer at Fortanix, about how confidential computing and a software-first model accelerate the shift to post-quantum cryptography.
| 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library in PQCryptoLib-SDK, for resilient post-quantum algorithms.
| 09/10/2025
No-Regrets Migration: Why PKI Should Be Your First Move
In this episode of Shielded, Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 16/09/2024
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
In this paper, we show that Peregrine, one of the candidates in the ongoing Korean post-quantum cryptography competition, is no exception, by demonstrating a practical key recovery attack against it.
| 11/09/2024
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
We present distributed key generation and decryption protocols for an additively homomorphic cryptosystem based on class groups, improving on a similar system proposed by Braun, Damgård, and Orlandi at CRYPTO '23.
| 28/08/2024
Mask Compression: High-Order Masking on Memory-Constrained Devices
In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography.
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
| 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2025?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 14/08/2024
CV2EC: Getting the Best of Both Worlds
Converting CryptoVerif models to EasyCrypt: getting the best of both worlds.
| 31/07/2024
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types now available, each offering different tradeoffs. However, one property that has remained elusive is adaptive security.
| 31/07/2024
Flood and submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
We propose a new framework based on random submersions for constructing verifiable short secret sharing and showcase it to construct efficient threshold lattice-based signatures in the hash-and-sign paradigm, when based on noise flooding.
| 31/07/2024
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
In this work, we construct the first efficient two-round lattice-based threshold signature without relying on FHE or HTDC.
| 18/07/2024
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. (journal version)
| 17/07/2024
Post-Quantum Secure Boot for Processors and FPGAs
This whitepaper summarises the current state of the PQC standards and the governmental regulations. It especially highlights the US Commercial National Security Algorithm Suite (CNSA) 2.0 which mandates software/firmware1 signing to use quantum-safe signatures as the default option by 2025, and as the only option by 2030.
1
…
5
6
7
8
9
…
13