Cybersecurity 2026Updated

List of Post-Quantum Cryptography Solution Providers

Comprehensive directory of vendors offering quantum-resistant encryption solutions, including hardware security modules, PKI platforms, cryptographic libraries, and migration services aligned with NIST PQC standards.

Available Data Fields

Company Name
Headquarters
Solution Type
NIST Algorithm Support
Deployment Model
Target Sector
Key Product
Founding Year
Certifications
Website

Data Preview

* Full data requires registration
Company NameHeadquartersSolution TypeKey Product
PQShieldOxford, UKHardware IP & Software LibrariesPQPlatform
EntrustMinneapolis, USPKI & HSMPKIaaS PQ
SandboxAQPalo Alto, USCryptographic Discovery & MigrationAQtive Guard
QuSecureSan Mateo, USNetwork Encryption PlatformQuProtect
CryptoNext SecurityParis, FranceCrypto-Agility SoftwareC-QSR Suite

100+ records available for download.

* Continue from free preview

Post-Quantum Cryptography Solution Providers: Navigating the Transition to Quantum-Safe Security

With NIST finalizing its first three post-quantum cryptography standards in August 2024—ML-KEM (CRYSTALS-Kyber), ML-DSA (CRYSTALS-Dilithium), and SLH-DSA (SPHINCS+)—the race to deploy quantum-resistant encryption has shifted from academic research to commercial implementation. Organizations now face a concrete migration timeline, and a growing ecosystem of vendors is emerging to address every layer of the cryptographic stack.

Market Landscape

The PQC market is projected to grow from $0.42 billion in 2025 to $2.84 billion by 2030, reflecting a 46.2% CAGR. Five major players—NXP Semiconductor, Thales, AWS, Palo Alto Networks, and IDEMIA—currently hold 59–70% of market share, while specialized startups capture high-value niches in migration tooling, embedded cryptographic IP, and crypto-agility platforms.

Vendor Categories

Hardware Security Module (HSM) Providers
Entrust, Thales, and Utimaco offer HSMs with firmware-level PQC algorithm support. Entrust launched the first commercially available post-quantum-ready PKI platform in January 2024. NXP embeds PQC directly into semiconductor products like the i.MX 94 processor family.
Cryptographic IP & Embedded Solutions
PQShield delivers silicon-ready cryptographic IP for chipmakers and OEMs, with direct contributions to NIST standardization. Rambus and Xiphera provide similar FPGA and ASIC-targeted solutions.
Migration & Discovery Platforms
SandboxAQ’s AQtive Guard scans enterprise infrastructure to identify vulnerable cryptographic assets and orchestrates migration to NIST-approved algorithms. QuSecure’s QuProtect platform provides network-layer quantum-resilient encryption without requiring infrastructure overhaul.
Crypto-Agility Software
CryptoNext Security (Paris) offers the C-QSR suite, validated by the Banque de France. Keyfactor and DigiCert focus on certificate lifecycle management with PQC support.

Industry Collaboration

The Post-Quantum Cryptography Alliance (PQCA), launched under the Linux Foundation, unites AWS, Cisco, Google, IBM, NVIDIA, QuSecure, SandboxAQ, and the University of Waterloo to accelerate open-source PQC adoption. This consortium signals that quantum-safe migration is no longer optional—it is an industry-wide imperative.

Key Selection Criteria

CriterionWhy It Matters
NIST Algorithm CoverageML-KEM and ML-DSA are mandatory baselines; SLH-DSA for stateless hash-based signatures
Hybrid Mode SupportRunning classical + PQC in parallel is the dominant 2025–2026 deployment model
Crypto-AgilityAbility to swap algorithms without code changes as standards evolve
FIPS 140-3 CertificationRequired for US federal and financial sector deployments
Side-Channel ResistanceHardware implementations must resist power analysis and timing attacks

Frequently Asked Questions

Q.Which NIST post-quantum algorithms do listed vendors support?

Most vendors implement ML-KEM (CRYSTALS-Kyber) for key encapsulation and ML-DSA (CRYSTALS-Dilithium) for digital signatures, the two primary NIST standards finalized in August 2024. Some also support SLH-DSA (SPHINCS+) for stateless hash-based signatures.

Q.How is this vendor data collected and kept current?

When you request the full dataset, our AI crawls public sources—vendor websites, press releases, certification databases, and industry reports—to compile the latest information. This is not a static database; data is gathered at request time.

Q.Does the list include both hardware and software PQC solutions?

Yes. The dataset covers the full spectrum: HSM vendors, silicon IP providers, software libraries, PKI platforms, network encryption appliances, and migration/discovery tools.

Q.Can I filter vendors by compliance requirements like FIPS 140-3?

Absolutely. You can specify compliance standards, target sectors, deployment models, or specific NIST algorithms to narrow the list to vendors matching your procurement criteria.