Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Industry Insights
Partners
Careers
Contact
Home
Team
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Industry Insights
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 19/03/2026
Mapping the Supply Chain: A Faster Path to Organizational Resilience
In this episode of Shielded, Jo Lintzen speaks to Sarah McCarthy, Quantum Readiness Program Lead at Citi, who shares how Citi's quantum readiness program has evolved since 2022. They discuss supply chain readiness, and why the first step toward quantum safety does not require a dedicated team or advanced algorithms.
| 18/03/2026
Solution Brief: PQMicroLib-Core for PQC Secure Boot in less than 5 KB of RAM
This Brief explains how PQShield PQMicroLib-Core enables a pure-software, OTA-deployable transition to Post-Quantum Secure Boot. PQShield’s ultra-small cryptographic library, PQMicroLib-Core is specifically designed to add quantum resilience to early boot and ROM stages. Read more.
| 18/03/2026
Solution Brief: Drop-in Post-Quantum TLS for embedded devices with PQMicroLib-Core
This Brief explains how PQShield delivers a standards-based drop-in PQC TLS stack built on PQMicroLib-Core (PQC algorithms), PSA Crypto APIs (portable and interoperable abstraction) and MbedTLS (TLS protocol layer and certificate management). Read more.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.
| 16/09/2024
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
This paper presents Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures.
| 16/09/2024
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
The main purpose of this work is to raise awareness about a primitive that can provide large efficiency gains in post-quantum cryptography: multi-recipient KEMs, ormKEMs.
| 16/09/2024
Optimizations and Practicality of High-Security CSIDH
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange.
| 16/09/2024
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
In this work, we present two round-optimal blind signatures under standard assumptions in the ROM with different approaches: one achieves the smallest sum of the signature and communication sizes, while the other achieves the smallest signature size.
| 16/09/2024
Antrag: Annular NTRU trapdoor generation
In this paper, we introduce a novel trapdoor generation technique for Prest's hybrid sampler over NTRU lattices.
| 16/09/2024
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
In this paper, we show that Peregrine, one of the candidates in the ongoing Korean post-quantum cryptography competition, is no exception, by demonstrating a practical key recovery attack against it.
| 11/09/2024
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
We present distributed key generation and decryption protocols for an additively homomorphic cryptosystem based on class groups, improving on a similar system proposed by Braun, Damgård, and Orlandi at CRYPTO '23.
| 28/08/2024
Mask Compression: High-Order Masking on Memory-Constrained Devices
In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography.
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
1
…
6
7
8
9
10
…
14