Beyond the Known.

We help teams evaluate novel protocols, privacy systems, proof systems, TEEs, secure ML, distributed systems, and post-quantum transitions with research that leads to practical decisions.

Novel Protocol Research

Explore new constructions, security models, protocol tradeoffs, and implementation paths before committing engineering resources.

Prototypes And Feasibility

Build enough of the system to test the core claim, uncover hidden constraints, and decide whether the direction is worth pursuing.

Technical Strategy

Compare primitives, architectures, threat models, and deployment options so product and engineering teams can make grounded decisions.

Research Areas

Our R&D work is strongest where applied cryptography, systems engineering, and product constraints meet.

Zero-Knowledge Proofs
Multi-Party Computation
Trusted Execution Environments
Post-Quantum Crypto
Credentials And Identity
Secure ML And Confidential Compute

Research Papers

Selected papers and technical work from our team.

Research for Clients

We can produce technical notes, feasibility studies, prototype evaluations, protocol analysis, and implementation guidance for teams deciding whether a new direction is sound enough to build. Below is an example of client research delivered as technical notes.

Notes and Proofs for Divisor Techniques

A review of divisor-based techniques for proving elliptic curve inner products, prepared ahead of their planned use in Monero. The report tightens the protocol definitions, gives a new extraction proof, and tracks the reasoning down to the constraints an implementation must check.

Research With Us.

Bring us the hard technical question. We will pressure-test the idea, map the unknowns, and identify the strongest path to evaluate or build.

Start a Conversation

Tell us what you want to understand, prove, prototype, or decide.

Contact Us →