← Back to Home

Our Research Projects

Exploring cutting-edge technologies to shape the future of digital identity, security, trust services, cloud native and AI

EUDI Wallet Platform

PoC

A comprehensive digital identity wallet platform compliant with the European Digital Identity (EUDI) framework. This platform enables secure storage, management, and presentation of digital credentials, supporting seamless cross-border authentication and identity verification across EU member states.

Related Regulations
eIDAS 2.0 GDPR EU Digital Identity

Post Quantum Cryptography

PoC

A comprehensive toolkit for testing and implementing post-quantum cryptographic algorithms standardized by NIST. This platform enables developers and security professionals to evaluate quantum-resistant cryptography in real-world scenarios, ensuring readiness for the post-quantum era with support for key encapsulation mechanisms (KEM) and digital signatures resistant to quantum computing attacks.

Related Regulations
NIST Standards Quantum-Safe Cryptography eIDAS 2.0

Age Verification

PoC
18

Privacy-preserving age verification system that enables online services to verify user age without revealing personal information. Using advanced cryptographic techniques and zero-knowledge proofs, users can prove they meet age requirements while maintaining complete privacy and data minimization.

Related Regulations
Digital Services Act GDPR Child Protection ePrivacy

QR Code Shield

PoC

Advanced QR code security platform that protects against malicious QR codes and phishing attacks. The system analyzes QR code destinations in real-time, provides threat intelligence, and creates secure QR codes with built-in authentication mechanisms for enterprise and consumer applications.

Related Regulations
Cybersecurity Act NIS2 Directive GDPR

Trusted IoT

MVP/Production

Enterprise-grade IoT security and trust platform that ensures device authenticity, secure communications, and trusted data exchange. The platform provides end-to-end security for IoT ecosystems with hardware-based root of trust, secure device provisioning, and continuous monitoring capabilities.

Related Regulations
Radio Equipment Directive Cybersecurity Act GDPR NIS2 Directive