QSPARC Labs

Post-Quantum Cryptography R&D

Cryptography for systems that cannot afford guesswork.

NIST finalized post-quantum standards in 2024. The migration window is closing-and the math protecting your data today will not survive what's coming.

Get a Security Briefing

30-minute call. No pitch. Just your exposure and next steps.

Learn how we approach the problem

The Threat Landscape

The quantum threat is not theoretical.
It is already operational.

2024

NIST finalized post-quantum standards

Federal agencies are mandated to migrate.

  • Enterprise infrastructure built today must conform to new standards
  • Non-compliant systems face a forced, costly overhaul on someone else's timeline

Now

Your data is being collected today - for decryption later

Nation-state actors are harvesting encrypted data now, storing it until quantum computers arrive.

  • Known as "harvest-now, decrypt-later"
  • Any long-lived sensitive data is already at risk

2029

Google's Q-Day target

Google targets a cryptographically relevant quantum computer by 2029.

  • Most organizations haven't started migrating
  • The window to act before Q-Day is closing

If your organization handles financial data, health records, government contracts, or long-lived IP-your data is already a target.

We build the cryptography. You build on it.

QSPARC licenses peer-reviewed cryptographic primitives directly — the math is the product.

  • No consulting retainers
  • No managed services
  • No lock-in
  • Founded by active researchers with 40+ peer-reviewed publications and NSF/NSA funding

Research funded by: NSF · NSA · Louisiana Board of Regents · Tulane University

Core Capabilities

Hardened Against Hardware Leaks

Implementations resistant to timing, power, and cache attacks - because algorithmic security means nothing if the hardware gives you away.

Formally Verified Security Boundaries

Explicit threat models and formal correctness proofs so you know exactly what’s protected and what isn’t. No ambiguity, no assumptions.

Decisions Based on Data, Not Vendor Claims

Benchmarked performance under realistic constraints so your integration trade-offs are measured, reproducible, and defensible.

Get a Security Briefing

30-minute call. No pitch. Just your exposure and next steps.

Founders

Mahir Bilen Can - Co-Founder

Mahir Bilen Can

Co-Founder

Ph.D. mathematician and professor specializing in algebraic combinatorics and quantum error-correcting codes.

  • Professor at Tulane University
  • 40+ peer-reviewed publications in IEEE Transactions on Information Theory and Designs, Codes and Cryptography
  • Fulbright Scholar
  • Funded by NSF, NSA, and Louisiana Board of Regents
  • Advised 13 doctoral students
  • Patent holder in quantum error-correcting codes
Eli Naig - Co-Founder & CEO

Eli Naig

Co-Founder & CEO

Mathematics researcher focused on algebraic coding theory and post-quantum cryptography, building production-grade implementations.

  • Three papers under review at Journal of Cryptology and Designs, Codes and Cryptography
  • Two patent applications filed in post-quantum cryptography
  • NSF REU scholar in quantum information science
  • Builds reference implementations in Rust, C, and Python