Build secure products with modern and rigorously engineered cryptography
  • Audit existing cryptographic protocols and implementations to reduce risk
  • Design and integrate tailored cryptographic components for your product
  • Plan and execute your post-quantum transition with clear technical milestones
  • Evaluate and apply zero-knowledge proofs where they create concrete value

About Us

Thierry Sans

Thierry Sans Ph.D, CISSP


I am an Associate Professor at the University of Toronto and former faculty member at Carnegie Mellon University, with over 15 years of experience teaching and practicing applied cryptography.

I have supervised advanced security projects, designed cryptographic systems, and advised startups and community initiatives on secure architecture and protocol design.

I have received research grants from the Secret Network Foundation, and the Ethereum Foundation, to develop cryptographic wallet infrastructure.

Consulting Services

Cryptography Audit

Identify critical cryptographic risks before they reach production

  • Review protocol design, key management, and implementations for subtle failure modes
  • Detect misuse patterns such as nonce reuse, weak entropy, and improper KDF usage
  • Deliver prioritized remediation guidance with validation and re-testing

Cryptography Design and Implementation

Design secure systems that are correct by construction

  • Architect protocols tailored to your threat model and performance constraints
  • Implement hardened cryptographic components with testing, fuzzing, and documentation
  • Ensure long-term maintainability through algorithm agility and audit-ready design

Post-Quantum Cryptography Transition

Prepare for quantum-era threats without disrupting production

  • Build a complete cryptographic inventory (CBOM) and migration roadmap aligned with NIST standards
  • Design hybrid and crypto-agile architectures that minimize performance and compatibility risks
  • Validate transition plans through controlled pilots and measurable benchmarks.

Zero-Knowledge Applications

Privacy-preserving verification without exposing sensitive data

  • Design and prototype zero-knowledge systems for authentication, authorization, and compliance use cases
  • Integrate proof verification into existing backends or blockchain environments
  • Optimize performance and cost for production-ready deployments

Corporate Training

  • Build Your
    Training
    Program

  • Module 1

    The Cryptography Toolbox

    Master the primitives and design patterns that underpin modern secure systems

    • Develop a rigorous understanding of core primitives (AEAD, KDFs, digital signatures, key exchange, randomness) and how they compose into secure constructions
    • Identify misuse patterns and subtle implementation pitfalls that frequently undermine otherwise sound designs
    • Apply threat-model-driven reasoning to select, combine, and deploy primitives correctly in production systems
  • Module 2

    Advanced Protocols

    Understand how heterogeneous systems compose cryptography to achieve distinct security objectives

    • Analyze diverse protocols across messaging, transport security, identity systems, and distributed architectures
    • Extract reusable design principles and identify recurring structural weaknesses
    • Develop the ability to critique and adapt protocol flows to your own system’s threat model and constraints
  • Module 3

    Post-Quantum Cryptography

    Design and execute a structured transition to quantum-resistant cryptographic systems

    • Understand the operational properties of lattice-based and post-quantum primitives
    • Evaluate migration strategies including hybrid constructions, crypto agility, and performance trade-off
    • Build actionable transition roadmaps aligned with operational, regulatory, and long-term confidentiality requirements
  • Module 4

    Zero-Knowledge Systems

    Architect privacy-preserving systems using modern zero-knowledge constructions

    • Understand the principles behind SNARKs, STARKs, and circuit-based proving systems
    • Design practical zero-knowledge workflows for authentication, authorization, compliance, and constrained verification
    • Evaluate integration, performance, and operational trade-offs for production-grade deployment

Request a Consultation

Discuss your cryptography challenges.Schedule a 30-minute technical discussion: thierry.sans@agolislabs.com