
Classic and post quantum lightweight crypto composites

Confidential computing cloud encryption research

Crypto integration in national critical infrastructure

Crypto implementation on custom hardware

Neuromorphic computing spiking neural networks

Post quantum crypto research

Quantum key distribution (authentication) quantum random number generators
