Beyond the Known.
We help teams evaluate novel protocols, privacy systems, proof systems, TEEs, secure ML, distributed systems, and post-quantum transitions with research that leads to practical decisions.
Novel Protocol Research
Explore new constructions, security models, protocol tradeoffs, and implementation paths before committing engineering resources.
Prototypes And Feasibility
Build enough of the system to test the core claim, uncover hidden constraints, and decide whether the direction is worth pursuing.
Technical Strategy
Compare primitives, architectures, threat models, and deployment options so product and engineering teams can make grounded decisions.
Research Areas
Our R&D work is strongest where applied cryptography, systems engineering, and product constraints meet.
Research Papers
Selected papers and technical work from our team.
Research for Clients
We can produce technical notes, feasibility studies, prototype evaluations, protocol analysis, and implementation guidance for teams deciding whether a new direction is sound enough to build. Below is an example of client research delivered as technical notes.
Notes and Proofs for Divisor Techniques
A review of divisor-based techniques for proving elliptic curve inner products, prepared ahead of their planned use in Monero. The report tightens the protocol definitions, gives a new extraction proof, and tracks the reasoning down to the constraints an implementation must check.
Research With Us.
Bring us the hard technical question. We will pressure-test the idea, map the unknowns, and identify the strongest path to evaluate or build.