Skip to main content Post quantum crypto research
Sovereign cryptographic library
Neuromorphic computing spiking neural networks
Confidential computing cloud encryption research
Quantum key distribution (authentication) quantum random number generators
Classic and post quantum lightweight crypto composites
Crypto implementation on custom hardware
Crypto integration in national critical infrastructure