Innovation
Quantum Key Distribution (QKD)
The privacy and integrity of communication relies on secret keys. Key-establishment mechanisms use asymmetrical ciphers and algorithms like RSA and Diffie-Hellman ...
Learn more
Post-quantum cryptography (PQC)
The computational power of emerging quantum computers poses a threat to many classical cryptographic systems. Public key cryptography and signature algorithms that are currently in use are no longer secure ...
Learn more
Mission-critical networks
Information security is a major challenge for critical infrastructure and operators of essential services. Established protection mechanisms are increasingly at risk ...
Learn more
Secure cloud infrastructure
Increasing cyber risks pose a significant threat to critical infrastructures, public authorities and businesses. In this digital era, highly secure and efficient networks ...
Learn more
Layer 1 encryption
Fiber-based high-speed communication networks are crucial for essential services, governments and defense, as they transport huge amounts of mission-critical data ...
Learn more