NovaQoreNovaQore
// Research

What the lab is working on.

Three tracks, one thesis. Privacy and trust are infrastructure. Below is a working snapshot of what we're actively building, breaking, and writing about, solo and with our research partners.

Track 01

Post-Quantum Cryptography

A working assumption: classical asymmetric cryptography is on borrowed time. We design and implement primitives, protocols, and integrations that hold up against quantum-capable adversaries.

Lattice-based KEMs

Production paths for CRYSTALS-Kyber across constrained and high-throughput environments.

Signatures

Dilithium and Falcon. Operational tradeoffs, key rotation, and deployment patterns.

Hybrid TLS

Dual key exchange (X25519 + Kyber) for transport security that degrades gracefully.

Track 02

Secure IoT & Edge

Fleets of small devices are the largest unsecured attack surface in deployed software today. We work on identity, attestation, and zero-trust networking that treats every device as hostile until proven otherwise.

Hardware-rooted identity

Provisioning that ties cryptographic identity to silicon, not configuration files.

Zero-trust mesh

Device-to-device protocols where the network is assumed compromised.

Attestation

Continuous, signed proof that a device is running what it claims to be running.

Track 03

Applied AI

Frontier models are the easy part. The hard part is building systems around them that are private, predictable, and ours. We work on the infrastructure that makes AI deployable in regulated, sensitive, and adversarial settings.

Encrypted inference

Patterns for serving models without surrendering plaintext to the platform.

Model orchestration

Routing, caching, and fallbacks across a heterogeneous model landscape.

Agentic systems

Tool use, memory, and constraints. Built carefully enough to deploy.

// Ways we collaborate

Pick the shape that fits.

Most of our work happens with partners. The lab is structured to take on a few engagements at a time across these formats.

// Joint research

Multi-month collaborations on cryptographic protocols, IoT systems, or AI infrastructure. Co-authored, co-prototyped.

// Embedded engineering

A senior pair sits with your team for a focused build. We bring the lab's playbook, you keep the code.

// Advisory & review

Threat modeling, protocol review, post-quantum migration plans. Short engagements with clear deliverables.

// Applied builds

Web systems, comms infrastructure, and AI integrations for partners we work with on the longer arc.

// Operating principles

How we work.

Adversarial defaults

Assume the network is hostile, the device is compromised, and the operator is curious. Design accordingly.

Ship to learn

Theory checked against production traffic. We deploy our own work first.

Privacy is a property

It must be provable from the architecture, not promised in marketing.

Have a problem worth our time?

Research collaborations, advisory work, and selective engineering engagements. Tell us what you're building.

Contact the lab