Add to favorites:
Share:
Proposals are expected to contribute to one or more of the following:
- Quantum-resistant cryptographic primitives, also other than lattice-based approaches if relevant, that enhance the security and privacy of digital wallets, both for natural persons and wallets, as well as the design and implementation of post-quantum solutions for entity authentication and authenticated key establishment over insecure networks;
- Formal verification tools, improved High-Assurance Cryptographic Software (HACS) approaches and their integration in software workflows, to provide strong security guarantees in post-quantum migration, and enable streamlined evidence-based evaluation of secure systems that use cryptography.
Scope:
The development of new digital signatures and advanced cryptographic schemes, tailored specifically to the use cases and requirements in the context of wallets/eIDs, for privacy and business applications is highly relevant nowadays. Moreover, these devices need secure connections over insecure networks requiring protocols for entity authentication, authenticated key establishment, as well as Password Authenticated Key Exchange (PAKE) schemes for ensuring user authentication via passwords in different use cases and for data recovery protocols of Wallet data.
Another key area is the development of High-Assurance Cryptographic Software (HACS), including automated evaluation methods.
Considering the above, proposals should address one of the following technology areas:
- Design and implementation of PQC advanced schemes and protocols for enhanced security and privacy, also including schemes other than lattice-based approaches if relevant. Proposals should also include recommendations that balance security, performance, and usability in practical applications and be based on open-source reusable software libraries.
- Development of a unified specification language to formalise and document conditions on cryptographic safety and security in software implementations; development and improvement of tools and methodologies that can be used to evaluate both the implementation and the usage of cryptography in software applications and provide formal machine-checked guarantees of correctness and security. Proposals should also consider improving existing HACS tools and their integration in such software implementations.
Expected Outcome
Proposals are expected to contribute to one or more of the following:
- Quantum-resistant cryptographic primitives, also other than lattice-based approaches if relevant, that enhance the security and privacy of digital wallets, both for natural persons and wallets, as well as the design and implementation of post-quantum solutions for entity authentication and authenticated key establishment over insecure networks;
- Formal verification tools, improved High-Assurance Cryptographic Software (HACS) approaches and their integration in software workflows, to provide strong security guarantees in post-quantum migration, and enable streamlined evidence-based evaluation of secure systems that use cryptography.
Scope
The development of new digital signatures and advanced cryptographic schemes, tailored specifically to the use cases and requirements in the context of wallets/eIDs, for privacy and business applications is highly relevant nowadays. Moreover, these devices need secure connections over insecure networks requiring protocols for entity authentication, authenticated key establishment, as well as Password Authenticated Key Exchange (PAKE) schemes for ensuring user authentication via passwords in different use cases and for data recovery protocols of Wallet data.
Another key area is the development of High-Assurance Cryptographic Software (HACS), including automated evaluation methods.
Considering the above, proposals should address one of the following technology areas:
- Design and implementation of PQC advanced schemes and protocols for enhanced security and privacy, also including schemes other than lattice-based approaches if relevant. Proposals should also include recommendations that balance security, performance, and usability in practical applications and be based on open-source reusable software libraries.
- Development of a unified specification language to formalise and document conditions on cryptographic safety and security in software implementations; development and improvement of tools and methodologies that can be used to evaluate both the implementation and the usage of cryptography in software applications and provide formal machine-checked guarantees of correctness and security. Proposals should also consider improving existing HACS tools and their integration in such software implementations.
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our premium members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Premium now and never miss an important opportunity again! Already a premium member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our premium members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Premium now and explore your personalized technology matches today! Already a premium member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Premium: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a Premium member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our Premium knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Premium now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.

