Publications Archive

Complete collection of our research papers, technical reports, and white papers

2026

PQC on the Edge: Can IoT Handle Post-Quantum Keys?

Technical Analysis • January 2026

Post-quantum cryptography promises long-term security against quantum attacks, but IoT devices operate under severe constraints...

2025

Quantum Threat to Blockchain: Will Bitcoin Survive?

Technical Briefing • December 2025

Bitcoin and Ethereum rely on elliptic curve cryptography (ECDSA) to secure billions of dollars in assets. When quantum computers capable of running Shor's algorithm arrive, that mathematical foundation crumbles. This article explains ...

Key Exchange vs. Digital Signatures: Why the Quantum Clock Ticks Differently

Technical Briefing • December 2025

TLS 1.3 relies on two distinct cryptographic operations: key exchange for confidentiality and digital signatures for authentication. Both are vulnerable to future quantum computers running Shor's algorithm. However...

The Practical Path to Quantum-Safe Security: Post-Quantum Cryptography Now, Quantum Key Distribution When It Fits

Perspective • October 2025

Quantum computing threatens current encryption methods, but two technologies offer protection: Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Rather than...

TLS 1.3: Quantum Vulnerabilities and Hybrid Defences

Technical Article • August 2025

Transport Layer Security (TLS) version 1.3 keeps our Internet communications confidential and authentic through elliptic-curve Diffie–Hellman key exchange and digital signatures. But...

Quantum-Safe Roadmap for GmbHs: BSI-Aligned Migration & Funding Tips

Briefing • July 2025

Your customer data must stay confidential well into the 2030s—long after RSA and ECC are crackable...

From Theory to Practice: Real-World PQC & Government Mandates

Briefing • July 2025

Post-quantum cryptography isn’t just lab code—it’s already protecting internet traffic, mainframes and cloud keys...

The Quantum Clock Is Ticking: What is Harvest-Now, Decrypt-Later?

Briefing • June 2025

Attackers are quietly collecting encrypted data today so it can be broken with tomorrow’s quantum computers...

BSI-Compliant Post-Quantum Key Exchange: Implementation Pitfalls

Technical Report • June 2025

This report provides an in-depth analysis of lattice-based key exchange schemes and their compliance with the German Federal Office for Information Security (BSI) TR-02102-1 guidelines...