Team
Products
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Home
Team
Products
PQCryptoLib – Embedded
PQCryptoLib
PQSDK
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPlatform – TrustSys
PQPerform – Lattice
Product Security
Certifications
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 30/04/2025
Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones
In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late.
| 16/04/2025
Your Cryptography is stuck in 2010 – How to Catch Up | Hart Montgomery
In this episode of Shielded: we speak with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk.
| 03/04/2025
How to Build Your 12-Month Post-Quantum Strategy With NIST’s Dustin Moody
Shielded welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now.
Show All
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 22/06/2022
More efficient, provably-secure direct anonymous attestation from lattices
The Cloud-Edges (CE) framework, wherein small groups of Internet of Things (IoT) devices are serviced by local edge devices, enables a more scalable solution to IoT networks.
| 14/02/2022
On Entropy and Bit Patterns of Ring Oscillator Jitter
We show how to evaluate entropy, autocorrelation, and bit pattern distributions of thermal jitter ring oscillator noise sources, even with low jitter levels or some bias.
| 06/01/2022
Development of the RISC-V entropy source interface
The RISC-V true random number generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the entropy source (ES) component away from cryptographic DRBGs.
|
| 19/11/2021
MIRACLE: MIcRo-ArChitectural Leakage Evaluation: A study of micro-architectural power leakage across many devices
In this paper, we describe an extensible experimental infrastructure for evaluating the micro-architectural leakage, based on power consumption, that stems from a physical device.
| 13/11/2021
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
Continuous group key agreements (CGKAs) are a class of protocols that can provide strong security guarantees to secure group messaging protocols such as Signal and MLS.
| 23/08/2021
A lightweight ISE for ChaCha on RISC-V
This paper proposes a lightweight ISE to support the cipher ChaCha on RISC-V architectures. we target embedded computing systems such as IoT edge devices that don’t support a vector engine.
| 23/08/2021
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage
Side-channel analysis (SCA) attacks pose a major threat to embedded systems due to their ease of accessibility.
| 11/08/2021
An Instruction Set Extension to Support Software-Based Masking
In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA).
| 09/07/2021
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
This paper introduces a new framework for the composition of probing-secure circuits.
| 11/05/2021
SoK: How (not) to Design and Implement Post-quantum Cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. We systematize the current state of knowledge on post-quantum cryptography.
| 01/05/2021
Exact Lattice Sampling from Non-Gaussian Distributions
We propose a new framework for (trapdoor) sampling over lattices.
| 20/03/2021
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort.
1
…
6
7
8
9
10