Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
All Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 16/10/2025
Solution brief: PQShield and Quantum Origin strengthening post-quantum cryptography with proven quantum randomness
PQShield and Quantinuum have developed a joint solution, combining Quantum Origin’s mathematically-proven Quantum Random Number Generation (QRNG) with PQShield’s FIPS-140-3-validated post-quantum cryptographic library in PQCryptoLib-SDK, for resilient post-quantum algorithms.
| 09/10/2025
No-Regrets Migration: Why PKI Should Be Your First Move
In this episode of Shielded, Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware.
| 29/09/2025
Quantum Secure Key Management: PQShield and Cryptomathic’s CrystalKey360
This joint Guide with Cryptomathic outlines the critical challenges driving a major evolution in cryptographic key management, namely the threat of quantum computing and the growing complexity of multi-cloud environments
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
| 23/04/2024
Side-channel analysis: why it matters?
Side-channel attacks are a physical type of threat that aims to recover sensitive data manipulated by your code without using cryptanalysis, or taking advantage of software vulnerabilities.
| 27/03/2024
Pioneering Side Channel Resistance for PQC
PQShield enables their customers to de-risk their development process with a comprehensive security strategy, rooted in the expertise of its world-class R&D team.
| 20/02/2024
Securing telecommunications networks against the quantum threat
In the near future, it's likely that the development of quantum computers will pose a significant threat to the methods that currently keep online information secure.
| 08/02/2024
Cryptography Modernization Part 2: Crypto-agility and hybrid schemes
In this second part to our no-nonsense guide on cryptographic modernization, our experts explore the topic of crypto-agility.
|
| 23/11/2023
The Three Body Problem: There’s more to building Silicon than what EDA tools currently help with
Electronic Design Automation (EDA) tooling facilitates the development of cutting edge technologies at the nanometre scale.
|
| 26/10/2023
On Gaussian sampling, smoothing parameter and application to signatures
We present a general framework for polynomial-time lattice Gaussian sampling. Using our techniques, we gain around 200 bytes (>20%) on the signature size.
| 10/08/2023
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography
In this work, we study key handling techniques used in real-life secure Kyber and Dilithium hardware. We describe WrapQ, a masking-friendly key-wrapping mechanism designed for lattice cryptography.
| 09/08/2023
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation
We present Bingo, an adaptively secure and optimally resilient packed asynchronous verifiable secret sharing (PAVSS) protocol.
|
| 09/08/2023
Fully Adaptive Schnorr Threshold Signatures
We prove adaptive security of a simple three-round threshold Schnorr signature scheme, which we call Sparkle+.
| 09/08/2023
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Both threshold and blind signatures have, individually, received a considerable amount of attention. However little is known about their combination.
| 09/08/2023
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme.
1
…
6
7
8
9
10
…
13