Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Industry Insights
Partners
Careers
Contact
Home
Team
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Industry Insights
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 08/01/2026
The End of Static Cryptography: What Leaders Must Understand Now
This special episode of Shielded brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades.
| 19/12/2025
Confidentiality vs Authentication: How Far the Web Has Actually Moved
In this episode of Shielded Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards.
| 04/12/2025
The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust
In this episode of Shielded, Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 28/08/2024
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others.
| 28/08/2024
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
In this work, we provide a simple and novel attack on blind signatures based on identification protocols performing parallel repetition to reduce the soundness error.
| 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2025?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 14/08/2024
CV2EC: Getting the Best of Both Worlds
Converting CryptoVerif models to EasyCrypt: getting the best of both worlds.
| 31/07/2024
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types now available, each offering different tradeoffs. However, one property that has remained elusive is adaptive security.
| 31/07/2024
Flood and submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
We propose a new framework based on random submersions for constructing verifiable short secret sharing and showcase it to construct efficient threshold lattice-based signatures in the hash-and-sign paradigm, when based on noise flooding.
| 31/07/2024
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
In this work, we construct the first efficient two-round lattice-based threshold signature without relying on FHE or HTDC.
| 18/07/2024
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. (journal version)
| 17/07/2024
Post-Quantum Secure Boot for Processors and FPGAs
This whitepaper summarises the current state of the PQC standards and the governmental regulations. It especially highlights the US Commercial National Security Algorithm Suite (CNSA) 2.0 which mandates software/firmware1 signing to use quantum-safe signatures as the default option by 2025, and as the only option by 2030.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
| 23/04/2024
Side-channel analysis: why it matters?
Side-channel attacks are a physical type of threat that aims to recover sensitive data manipulated by your code without using cryptanalysis, or taking advantage of software vulnerabilities.
1
…
6
7
8
9
10
…
14