
Post quantum crypto research

Sovereign cryptographic library

Neuromorphic computing spiking neural networks

Confidential computing cloud encryption research

Quantum key distribution (authentication) quantum random number generators

Classic and post quantum lightweight crypto composites

Crypto implementation on custom hardware
