We specialize in the full lifecycle of post-quantum secure system development, from design, validation, to deployment.

  • The team investigates quantum-resilient computing and cryptographic systems, examines potential vulnerabilities, enhances algorithms for efficient hardware deployment, and conducts formal cryptanalysis.

  • Post-Quantum Cryptography

  • Post-Quantum Hardware Library

  • Lattice-Based Cryptography

  • Code-Based Cryptography

  • Cryptographic Agility

  • Homomorphic Encryption Hardware

  • Zero Knowledge Proof

  • Post-Quantum Transition

  • Post-Quantum Cryptosystems Training

.

Research, Development, and Training Portfolio

Algorithms Design

We develop advanced variants of code-based cryptosystems that remain resilient against quantum attacks. Our work includes a novel adaptation of the McEliece cryptosystem using non-binary Orthogonal Latin Square Codes (OLSC), significantly reducing complexity and key size.

Learn More

High-Performance Designs

We offer a suite of FPGA-optimized post-quantum cryptographic primitives (PQCPs), including Public Key Cryptosystems (PKC), Key Exchange (KEX), Oblivious Transfer (OT), and Zero-Knowledge Proofs (ZKP), tailored for high-throughput and secure applications.

Learn More

Flexible Hardware Library

Our open-source hardware library accelerates core arithmetic operations in RLWE-based cryptosystems. It includes modules for Residue Number Systems (RNS), Chinese Remainder Theorem (CRT), and Number Theoretic Transform (NTT)-based polynomial multiplication.

Learn More

Homomorphic Encryption

We introduce the HERISCV Processor, an innovative RISC-V architecture designed for homomorphic encryption. It delivers substantial performance gains for lattice-based cryptography with configurable parameters for diverse applications.

Learn More

Noise Sampling Designs

We provide a range of optimized noise samplers for small error sampling, offering concrete recommendations based on efficiency, hardware cost, and throughput to support secure and scalable cryptosystem implementations.

Learn More

Low-Power Hardware Design

To address the power demands of PQC systems, we explore architectural enhancements that enable their deployment in low-power environments, including portable and IoT devices.

Learn More

Proven QPC Hardware Design Flow

Image

Foundations of Quantum Resistant Cryptography

We examine the mathematical underpinnings, real-time implementations, and hardware architectures of post-quantum cryptographic algorithms, guided by the NIST PQC standardization process. Our research addresses open challenges, attack surfaces, and the need for cryptographic agility.

We formally evaluate algorithmic performance, parallelism, worst-case security assumptions, memory efficiency, and latency. Our work spans lightweight lattice-based cryptography, ultra-low latency designs, and seamless integration with existing digital infrastructures.

Algorithm Design

Open-Source Hardware Implementation of PQC Primitives

We have developed a collection of post-quantum cryptographic primitives optimized for FPGA platforms and commonly used security protocols. These implementations are specifically tailored to leverage the architectural strengths of FPGAs, incorporating algorithmic refinements that significantly reduce area and latency without compromising cryptographic integrity. The entire hardware suite is open-source, featuring synthesizable and fully verifiable RTL code. At its core, the design includes a highly configurable RTL framework equipped with an efficient n-point Number-Theoretic Transform (NTT) module, enabling rapid polynomial multiplication essential for lattice-based cryptography.

Hardware Designs

Image

Privacy-Preserving Computing Solutions

The proliferation of sensor-driven and connected devices has made cloud computing a ubiquitous service. However, data privacy remains a critical concern, especially in shared-resource environments.

With over 2,500 known cloud vulnerabilities, a 150% increase in five years, our work focuses on secure computation frameworks that preserve privacy in cloud-based environments.

Explore Solutions

Next-Generation Cryptosystems Design

We are committed to advancing the design of cryptographic systems that are resilient to quantum-era threats, integrating cutting-edge research with practical deployment strategies.

Loading...