What the lab is working on.
Three tracks, one thesis. Privacy and trust are infrastructure. Below is a working snapshot of what we're actively building, breaking, and writing about, solo and with our research partners.
Post-Quantum Cryptography
A working assumption: classical asymmetric cryptography is on borrowed time. We design and implement primitives, protocols, and integrations that hold up against quantum-capable adversaries.
Lattice-based KEMs
Production paths for CRYSTALS-Kyber across constrained and high-throughput environments.
Signatures
Dilithium and Falcon. Operational tradeoffs, key rotation, and deployment patterns.
Hybrid TLS
Dual key exchange (X25519 + Kyber) for transport security that degrades gracefully.
Secure IoT & Edge
Fleets of small devices are the largest unsecured attack surface in deployed software today. We work on identity, attestation, and zero-trust networking that treats every device as hostile until proven otherwise.
Hardware-rooted identity
Provisioning that ties cryptographic identity to silicon, not configuration files.
Zero-trust mesh
Device-to-device protocols where the network is assumed compromised.
Attestation
Continuous, signed proof that a device is running what it claims to be running.
Applied AI
Frontier models are the easy part. The hard part is building systems around them that are private, predictable, and ours. We work on the infrastructure that makes AI deployable in regulated, sensitive, and adversarial settings.
Encrypted inference
Patterns for serving models without surrendering plaintext to the platform.
Model orchestration
Routing, caching, and fallbacks across a heterogeneous model landscape.
Agentic systems
Tool use, memory, and constraints. Built carefully enough to deploy.
Pick the shape that fits.
Most of our work happens with partners. The lab is structured to take on a few engagements at a time across these formats.
Multi-month collaborations on cryptographic protocols, IoT systems, or AI infrastructure. Co-authored, co-prototyped.
A senior pair sits with your team for a focused build. We bring the lab's playbook, you keep the code.
Threat modeling, protocol review, post-quantum migration plans. Short engagements with clear deliverables.
Web systems, comms infrastructure, and AI integrations for partners we work with on the longer arc.
How we work.
Adversarial defaults
Assume the network is hostile, the device is compromised, and the operator is curious. Design accordingly.
Ship to learn
Theory checked against production traffic. We deploy our own work first.
Privacy is a property
It must be provable from the architecture, not promised in marketing.
Have a problem worth our time?
Research collaborations, advisory work, and selective engineering engagements. Tell us what you're building.
Contact the lab