Team
Products
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Certifications
Product Security
Regulatory Landscape
Markets
Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Healthcare
Publications
News
Industry Insights
Partners
Careers
Contact
Home
Team
Products
PQMicroLib-Core
PQCryptoLib-Core
PQCryptoLib-SDK
PQPlatform-CoPro
PQPlatform-TrustSys
PQPerform-Flare
PQPerform-Inferno
PQPerform-Flex
Product Security
Certifications
Markets
All Markets
Semiconductors and Manufacturing
Identity and Paymentech
Military and Aerospace
System Integrators
Automotive
Industrial IoT
Network & Telecommunications
Enterprise Platforms
Publications
News
Industry Insights
Events
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 06/03/2026
Your Inventory Dashboard is Not a Migration Strategy
In this episode of Shielded we speak with Stefan Kölbl, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.
| 06/02/2026
Post-Quantum Negligence: When Inaction Becomes Legal Exposure
In this episode of Shielded, Jo speaks to Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector.
| 08/01/2026
The End of Static Cryptography: What Leaders Must Understand Now
This special episode of Shielded brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades.
Show All
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Solution Briefs
Podcasts
Videos
Best Paper
Research Papers
Whitepapers
| 18/07/2024
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. (journal version)
| 17/07/2024
Post-Quantum Secure Boot for Processors and FPGAs
This whitepaper summarises the current state of the PQC standards and the governmental regulations. It especially highlights the US Commercial National Security Algorithm Suite (CNSA) 2.0 which mandates software/firmware1 signing to use quantum-safe signatures as the default option by 2025, and as the only option by 2030.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
| 23/04/2024
Side-channel analysis: why it matters?
Side-channel attacks are a physical type of threat that aims to recover sensitive data manipulated by your code without using cryptanalysis, or taking advantage of software vulnerabilities.
| 27/03/2024
Pioneering Side Channel Resistance for PQC
PQShield enables their customers to de-risk their development process with a comprehensive security strategy, rooted in the expertise of its world-class R&D team.
| 20/02/2024
Securing telecommunications networks against the quantum threat
In the near future, it's likely that the development of quantum computers will pose a significant threat to the methods that currently keep online information secure.
| 08/02/2024
Cryptography Modernization Part 2: Crypto-agility and hybrid schemes
In this second part to our no-nonsense guide on cryptographic modernization, our experts explore the topic of crypto-agility.
|
| 23/11/2023
The Three Body Problem: There’s more to building Silicon than what EDA tools currently help with
Electronic Design Automation (EDA) tooling facilitates the development of cutting edge technologies at the nanometre scale.
|
| 26/10/2023
On Gaussian sampling, smoothing parameter and application to signatures
We present a general framework for polynomial-time lattice Gaussian sampling. Using our techniques, we gain around 200 bytes (>20%) on the signature size.
| 10/08/2023
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography
In this work, we study key handling techniques used in real-life secure Kyber and Dilithium hardware. We describe WrapQ, a masking-friendly key-wrapping mechanism designed for lattice cryptography.
| 09/08/2023
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation
We present Bingo, an adaptively secure and optimally resilient packed asynchronous verifiable secret sharing (PAVSS) protocol.
1
…
7
8
9
10
11
…
14