ExeQuantum and ANU Establish Industry Partnership to Advance Post-Quantum Hardware R&D
As the global cybersecurity community races to adopt quantum-safe standards, the real challenge is no longer just algorithm selection, it’s deployment. Cryptography doesn’t live in white papers; it lives in code, in infrastructure, and increasingly, in hardware.
At ExeQuantum, we’ve seen that first-hand through our enterprise deployments, API integrations, and industry workshops. But in recent months, we’ve also seen a growing demand from the academic and research world to take post-quantum cryptography (PQC) out of theory and into form factors that reflect the real-world complexity of system design.
That’s why we’re excited to announce a new research collaboration with the Australian National University (ANU), focused on advancing the integration of post-quantum cryptography at the hardware layer.
The Australian National University (ANU), ranked 30th globally in the 2025 QS World University Rankings, is recognised as a world leader in research and innovation. ANU has played a significant role in advancing quantum technologies, including early quantum photonics research and leadership within national quantum initiatives. This collaboration reflects a mutual commitment to applying cutting-edge cryptographic research in real-world, hardware-oriented contexts.
From Algorithm to Architecture
This partnership is centred around a pilot project exploring how standardised PQC algorithms, including ML-KEM and ML-DSA, can be implemented directly into physical systems. These systems could range from security modules and edge computing devices to secure comms nodes and cryptographic key stores.
The aim is not just to make PQC available, but to make it embedded, minimising latency, reducing attack surface, and enabling secure-by-design architecture across legacy and next-gen systems alike.
This is part of a broader vision we’ve pursued at ExeQuantum: to move beyond theoretical PQC conversations and build infrastructure that actually runs in production, whether it’s in enterprise apps, secure messaging protocols, or hardware-embedded endpoints.
The Role of Hardware in Quantum Readiness
Much of the post-quantum conversation today focuses on software updates, TLS extensions, and API-level integrations, and those are important. But in many critical applications, including finance, defence, IoT, and critical infrastructure, hardware-level trust boundaries are where the real risks lie.
Embedding post-quantum algorithms at the silicon or device level ensures cryptographic operations aren’t just optional enhancements, but fundamental operations in the system’s lifecycle. It also enables compatibility with constrained environments, low-power devices, and air-gapped systems where traditional software-only models break down.
Building on a Track Record
This partnership with ANU builds on ExeQuantum’s growing academic footprint, which already includes:
- Guest lecturing
- Sandbox integration
- Direct curriculum contribution
At the same time, we’ve delivered workshops and production deployments with private-sector partners in manufacturing, finance, and telecom.
The goal has always been the same: to make post-quantum cryptography accessible, robust, and aligned with real operational needs.
What Comes Next
The ANU hardware R&D pilot, scheduled to begin this September, represents a deeper step into the question of how post-quantum systems should actually be built; Fundamentally designed with PQC at the core.
We’ll be sharing more as this pilot unfolds, but what excites us most is that this isn’t just a research project. It’s a signal that universities, enterprises, and cryptography companies can align around practical innovation, and that real quantum resilience starts now, not later.
If you’re working in cryptography, security hardware, or post-quantum curriculum design, and you want to be part of this evolution , we’d love to talk.Learn more about the ExeQuantum University Program: https://exequantum.com/university-program