C5-DEC: Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification


Semi-Automated Threat Reconnaissance and Analysis Powered by Description Logics


Intrusion Detection and Prevention Systems for Evading Supply Chain Attacks and Post-compromise Effects

Quantum Secure Encryption Box

A user-friendly encryption tool for secure local data storage and end-to-end exchange largely based on formally verified implementations of classical cryptographic and PQC algorithms

Post-Quantum Cryptography (PQC) Migration Toolkit

Description to be added soon…

Threat Modelling and System Security Risk Assessment Toolkit

Description to be added soon…

Scroll to Top