Benchmarks H33 FHE H33 ZK APIs Pricing Token Docs Blog About
Log In Get API Key
🛡️ H33: 1.923ms Full Auth • Zero Data Exposure • k-of-n Threshold • Post-Quantum • NIST L1 → L5 📜 15 Patent Claims Pending1,598 Tests Passing

655,000 authentications per second. Zero data exposure.

The only biometric auth where your template is NEVER decrypted.
k-of-n threshold · Post-quantum · 128-bit NIST L1256-bit NIST L5 FHE security

1.93ms single authentication · 1.7µs amortized at scale · P99 under 5ms at 50,000 req/sec
Gets faster under load — not slower.

212µs
H0 (Dev)
1.923ms
H33 (128-bit NIST L1)
13.6ms
H-256 (NIST L5 / 256-bit)
3.1×
vs SEAL
Zero Exposure
Guaranteed
Blink Test: 300ms blink ÷ 1.923ms = ~155 full crypto auths per blink. The only auth where your biometric is NEVER decrypted.

Performance Modes v7.0

Mode Latency Security NIST Level
H0 212µs ~57-bit Dev Only
H33-128 ⭐ 1.923ms 128-bit NIST L1 Zero Exposure
H-256 ✓ 13.6ms 256-bit (NIST L5) Zero Exposure

H0 (N=1024) dev only (~57-bit). H33-128 and H-256 are NIST-compliant: H33-128 (N=4096) NIST L1 128-bit; H-256 (N=16,384) NIST L5 256-bit. All use bfv_params_override for compliance.

H0 Dev Mode (212µs) — Dev Only

Encrypt + distance + single-party decrypt only. No threshold, no PLOOKUP, no Dilithium.

FHE Encrypt (BFV, N=1024) 130µs 61%
FHE Distance Compute 48µs 23%
FHE Decrypt (single-party) 33µs 16%
TOTAL 212µs 100%

H33-128 CollectiveAuthority (1.923ms) — 128-bit NIST L1 FHE + Zero Exposure

BFV Encrypt (Q-128 Standard) ~700µs 36%
FHE Distance (encrypted space) ~145µs 8%
k-of-n Threshold Decrypt (3-party Shamir) ~700µs 26%
Threshold Combine + SHA3 ~350µs 13%
Encode / Normalize / Quantize ~300µs 11%
PLOOKUP Prove 7.3µs <1%
PLOOKUP Verify ~728ns <1%
Dilithium Sign + Verify ~88µs 5%
TOTAL PIPELINE 1.923ms Zero Exposure
ZK Verification (Production: PLOOKUP)
PLOOKUP Verify: 720ns | Prove: 7.3µs (dim=128) | Proof: 105B
Legacy (pre-optimization): KZG 108ms (96B) | IPA 170ms (944B) — Current: KZG prove 40.7ms | IPA prove 40.6ms (see API docs)
Blink = 300,000µs
H33-128: 300,000 ÷ 1,923 = ~155 full crypto auths per blink
H-256: 300,000 ÷ 19,600 = ~15 auths per blink
vs SEAL FHE: ~6ms (FHE-only) | H33 FHE: ~1.46ms = ~11× faster + NIST L1 + zero exposure

Measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). Criterion.rs v0.5, 100+ samples. February 13, 2026.
Note: H33/H2 upgraded to N=4096 for NIST L1 compliance. Latencies being re-benchmarked.

full-stack-auth.js
// Ship quantum-resistant auth this afternoon const result = await h33.auth.verify({ userId: 'user_123', biometric: faceData // H33-128 default: 1.923ms, 128-bit NIST L1 FHE, zero exposure }); // Maximum security? One parameter. const secure = await h33.auth.verify({ userId: 'user_123', biometric: faceData, mode: 'h-256' // n=16,384, Q=216 → TRUE 256-bit NIST L5 ✓ });
Performance

1.923ms Full Auth. Zero Data Exposure. k-of-n Threshold.

Measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). Criterion.rs, 100+ samples. February 13, 2026 | v7.0

🛡️
H33-128 (Zero Exposure)
1.923ms
k-of-n threshold, 128-bit NIST L1
🔐
H-256 (Max Mode)
13.6ms
N=16,384, NIST L5 ✓
🔐
PQC Total
~88µs
Kyber768 + Dilithium3
H0 Mode
212µs
Turbo Full Match (dev only)
🔐
+PLOOKUP Prove
7.3µs
verify: 720ns, 105B proof
🚀
vs Microsoft SEAL
3.1×
faster + zero exposure + complete pipeline
1.923ms full post-quantum authentication with zero data exposure
H33-128 CollectiveAuthority: FHE matching in encrypted space + k-of-n threshold decrypt + PLOOKUP proof (7.3µs) + Dilithium. Your biometric is NEVER decrypted on any single server.
3.1×
faster than SEAL + zero exposure
A human blink takes 300,000 microseconds.
In that time, H33 can complete ~155 full crypto auths (1.923ms each), or ~17,600 cached verifications (17µs Cachee L1 hit).
113
crypto auths per blink
Speed Comparison

H33 vs Microsoft SEAL

Same security. Complete pipeline. 3.1× faster. Zero data exposure. k-of-n threshold means no single server sees your plaintext.

Same Security, Different Speed

Operation SEAL BFV H33 H33 H33 Advantage
Encrypt 500-800 µs ~700µs Comparable (H33 includes encoding)
Compute Distance 4,720 µs ~145µs 3.1× faster pipeline
Relinearize 11,900 µs n/a (no relin) ∞ (skipped)
Full Auth Pipeline ~17,920µs 1.923ms 3.1× faster + zero exposure

Why the difference? SEAL is a general-purpose FHE library. H33 is purpose-built for authentication: shallow circuits, aggressive batching, no relinearization needed. Same BFV scheme, same security—just optimized for one use case.

Full Stack Auth Speed Comparison

Stack H33 Competitors (Combined) H33 Advantage
H33-128 (CollectiveAuthority, 128-bit NIST L1) 1.923ms ~17,920µs (SEAL alone) 3.1× faster + zero exposure
ZK Proof (PLOOKUP) 7.3µs ~20ms+ (STARK alternatives) ~2,740x faster

Individual Component Breakdown (v7.0)

Component H33 Alternative Notes
FHE Encrypt (H33 N=4096) ~700µs SEAL: 500-800µs Comparable encryption speed
FHE Compute Distance (Q-128) ~145µs SEAL: 4,720µs (general multiply) 3.1× faster pipeline. Purpose-built vs general.
H33-128 Full Auth (CollectiveAuthority) 1.923ms SEAL: ~17,920µs 3.1× faster + zero data exposure.
FHE Full Auth (H-256) 13.6ms SEAL: ~15-20ms 256-bit NIST L5. Highest NIST tier (L5). Zero exposure.
ZK Proof (PLOOKUP) 7.3µs STARK: 20ms+ Production ZK. 105B proof. ~728ns verify. PQ-safe.
Kyber768 Full KEM 57.8µs liboqs: ~60µs Keygen 16.8µs + Encap 21.4µs + Decap 19.6µs
Dilithium3 Sign+Verify ~88µs liboqs: ~180µs Sign ~65µs + Verify ~23µs
Full Crypto Auth (H33-128 CollectiveAuthority) 1.923ms ~17,920µs (SEAL FHE alone) 3.1× faster + zero data exposure.

Measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). Criterion.rs v0.5, 100+ samples. February 13, 2026. Dual-socket NUMA-pinned for throughput numbers.

Why H33

1.923ms. Zero Data Exposure. Post-Quantum.

The only biometric auth where your template is NEVER decrypted. H33-128 CollectiveAuthority uses k-of-n threshold decrypt so no single server ever sees plaintext. PLOOKUP prove: 7.3µs, verify: 720ns. 3.1× faster than Microsoft SEAL.

1.923ms
H33-128 Full Auth
~700µs
BFV Encrypt (Q-128)
7.3µs
PLOOKUP Prove
3.1×
vs SEAL
Capability H33 (Feb 2026 v7.0) Industry Best H33 Advantage
H0 Mode (Turbo Full Match) 212µs No comparison ~57-bit security (dev only)
H33-128 (CollectiveAuthority, N=4096) 1.923ms SEAL: ~17,920µs 3.1× faster + zero exposure
Merkle Verify (cached) 21.70µs ~100-500µs 4-20x faster
PLOOKUP ZK Prove 7.3µs ~20ms+ (STARK) ~2,740x faster. 105B proof.
H33-128 Full Auth (CollectiveAuthority) 1.923ms ~17,920µs (SEAL alone) 3.1× faster + zero data exposure + k-of-n
Dilithium3 (NIST L3) ~88µs liboqs: ~180µs Sign ~65µs + Verify ~23µs
Auths Per Blink ~113 crypto auths N/A 300,000µs ÷ 1.923ms
Throughput (96-core, dual-socket) No comparable offering Billions/day at scale
Cold Start (Full PQC) 3.18ms N/A First auth (20% penalty vs warm)
PQC Overhead ~196µs N/A Kyber768 57.8µs + Dilithium3 ~88µs
Cache Read Throughput ~59K ops/sec ~100K/sec typical Cachee L1 cluster, 100% hit rate

Measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). Criterion.rs v0.5, 100+ samples. February 13, 2026. Dual-socket NUMA-pinned for throughput numbers.

Cryptographic Specifications

Multi-Level NIST Post-Quantum Cryptography

Every authentication is protected by formally verified, standards-compliant cryptographic primitives.

🔐

FHE: BFV Scheme

Scheme: Brakerski/Fan-Vercauteren
Ring Dimension: N = 4,096 (H33/H2 NIST L1)
Coefficient Modulus: Q ≤ 109 bits (bfv_params_override)
Plaintext Modulus: t = 65,537 (H33/H2/H-256)
Security Level: 128-bit NIST L1
✓ Two NIST-compliant tiers: H-256 (L5, 256-bit), H33-128 (L1, 128-bit)
🔑

Kyber768 (ML-KEM)

Standard: FIPS 203
Security Level: NIST Level 3 (AES-192)
Public Key: 1,184 bytes
Ciphertext: 1,088 bytes
Encap + Decap: 41µs
✍️

Dilithium3 (ML-DSA)

Standard: FIPS 204
Security Level: NIST Level 3 (AES-192)
Public Key: 1,952 bytes
Signature: 3,309 bytes
Sign + Verify: ~88µs (123.1 + 39.7)
🔐

ZK: PLOOKUP PRODUCTION

Mechanism: SHA3-256 hash chains
Prove: 7.3µs
Verify: 720ns
Proof Size: 105 bytes
Post-Quantum: Yes (hash-based)

PLOOKUP Production ZK v7.0

Hash-based PLOOKUP for production auth. SHA3-256 hash chains + lookup table range checks. Post-quantum safe.

7.3µs
PLOOKUP Prove
720ns
PLOOKUP Verify
105B
PLOOKUP Proof Size
~137K/sec
PLOOKUP Throughput
1.923ms
H33 Full Auth
Crypto Throughput (96-core)
~59K ops/sec
Cached Sessions
Full Security Parameters Appendix v4.0 →
API Services

The full post-quantum stack. One API.

FHE biometrics, ZK proofs, quantum signatures, blockchain attestation. Everything you need for privacy-preserving authentication.

🧬
FHE Biometrics
Face, voice, fingerprint matching on encrypted data. k-of-n threshold decrypt. ~700µs BFV encrypt + ~145µs FHE distance (AWS Graviton4). 3.1× faster than SEAL's FHE pipeline + zero exposure.
POST /biometric/enroll POST /biometric/verify POST /auth/incremental
NEW
🔢
CKKS FHE
Floating-point homomorphic encryption. Compute on encrypted real numbers. 128/192/256-bit security levels.
POST /fhe/ckks/keygen POST /fhe/ckks/encrypt POST /fhe/ckks/decrypt POST /fhe/ckks/add POST /fhe/ckks/multiply POST /fhe/ckks/rescale
🔒
Zero-Knowledge Proofs
Prove identity, age, location without revealing data. Custom circuits supported.
POST /zkp/prove POST /zkp/verify
🔐
Quantum Signatures
CRYSTALS-Dilithium & Kyber. NIST FIPS 203/204 compliant. ~88µs sign+verify. NIST L3 post-quantum.
POST /quantum/sign POST /quantum/verify
⛓️
Blockchain Attestation
Solana soulbound NFTs. Immutable audit trails. ZK-compressed logging (5000x less expensive).
POST /blockchain/attest POST /blockchain/mint-sbt
NEW
👻
Invisible Auth
Zero-transmission authentication. No codes displayed. Hardware-secured invisible keys.
POST /auth/invisible POST /auth/session
PATENT
🛡️
Estate Fraud Detection
Behavioral shift detection from deceased baselines. Beneficiary collusion detection. Court-admissible evidence.
POST /fraud/estate/analyze GET /fraud/evidence
🏛️
KYC / AML
Privacy-preserving identity verification. ZK proofs of eligibility without exposing documents.
POST /kyc/verify POST /aml/screen
🧠
Continuous Auth
Multi-modal fusion: keystroke, mouse, face, voice. LSTM behavioral modeling. 99.2% attack detection.
WS /auth/continuous POST /auth/behavioral
📜 15 Patent Claims Pending

7 Core Innovations

Protected intellectual property covering the complete post-quantum authentication stack.

1
Homomorphic Biometric Matching
Euclidean distance on encrypted templates. Zero data exposure. BFV scheme with SIMD batching.
2
Zero-Knowledge Identity Proofs
Custom R1CS circuits for age, location, credential verification. 40% constraint reduction.
3
Continuous Multi-Modal Fusion
LSTM temporal modeling. Keystroke, mouse, face, voice, physiological signals. 94.7% accuracy.
4
Quantum-Resistant Architecture
Kyber, Dilithium, FALCON with automated migration. 30+ year quantum resistance.
5
Estate Fraud Detection
Behavioral shift analysis from deceased baselines. Collusion detection. Legal evidence generation.
6
ML Threat Attribution
Ensemble classification for attack source identification. Campaign tracking. 89-95% accuracy.
7
Blockchain Compliance
Smart contracts for GDPR/HIPAA. ZK-compressed logging. 5000x cost reduction.
+
Invisible Authentication
Zero-transmission auth. Hardware-secured keys. Zero-knowledge registration.
✓ Cancel anytime • Included auths per month • Annual: 2 months free

Monthly subscription pricing

Per-auth pricing. Upgrade or downgrade anytime. Annual plans get 2 months free (~17% off).

Free
$0
1,000 auths/mo
50 H33 auths/mo
All APIs
H0 mode only
5 req/sec
Production use
Starter
$349/mo
5,000 auths/mo
500 H33 auths/mo
All tiers (H0-H256)
10 req/sec
Email support
Webhooks
Business
$2,499/mo
50,000 auths/mo
5,000 H33 auths/mo
200 req/sec
99.9% SLA
20 API keys
4hr support
Growth
$6,999/mo
175,000 auths/mo
15,000 H33 auths/mo • 500 req/sec
Scale
$17,999/mo
500,000 auths/mo
40,000 H33 auths/mo • SOC 2
Enterprise
$49,999/mo
1.5M auths/mo
125K H33 auths/mo • Dedicated AM
Enterprise+
$119,999/mo
5M auths/mo
500K H33 auths/mo • Premium SLA

Security Level Surcharges

Higher security levels add a per-auth surcharge
Tier Surcharge Latency Description
H0 ⚠️ Base 212µs Dev only (~57-bit)
H33-128 ⭐ +$0.01 1.923ms Zero exposure flagship (NIST L1)
H-256 ✓ +$0.02 13.6ms NIST L5 + k-of-n threshold

KYC / Identity (Fixed Pricing)

$49
KYC Basic + SBT
ID, Selfie, Liveness, Soulbound NFT mint
$79
KYC Enhanced + SBT
+ Proof of Address verification
$19
AML/PEP Screening
Sanctions, PEP, Adverse Media
$99
Full Bundle
KYC + AML + Soulbound NFT

All KYC includes: FHE-encrypted biometrics, ZK proof, quantum signatures, Solana soulbound NFT.

Security

Enterprise-grade. Formally verified.

Post-quantum cryptography, 16 mathematical proofs, 7 defense layers. Security that doesn't slow you down.

9.9/10
Internal Security Assessment
View Testing Methodology →
0
Critical Vulns
16
Kani Proofs
7
Defense Layers
99.2%
Attack Detection

7-Layer Defense in Depth

Layer 7: Post-Quantum Cryptography Dilithium3 + Kyber768 • NIST Level 3
Layer 6: Zero-Knowledge Proofs PLOOKUP • Privacy without exposure
Layer 5: Homomorphic Encryption BFV/CKKS • Compute on encrypted data
Layer 4: Hardware Security (TEE) Intel SGX • Fortanix EDP
Layer 3: Formal Verification 16 Kani Proofs • Mathematical guarantees
Layer 2: Network Security WAF • DDoS • mTLS • Segmentation
Layer 1: Infrastructure AWS • VPC • IAM • CloudTrail

Compliance Ready

🏥
HIPAA
🇪🇺
GDPR
📊
SOC 2
💳
PCI DSS
🔒
ISO 27001
🏛️
FedRAMP
Benchmarks

Real-world performance. Independently verifiable.

All benchmarks on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2, ARM NEON, bare metal). Criterion.rs v0.5, 100+ samples. February 13, 2026.

Instance
c8g.metal-48xl (Graviton4)
96 cores • Neoverse V2 • ARM NEON
Full Crypto Auth
FHE + PLOOKUP + Dilithium (dual-socket)
Cachee L1 GET
~59K ops/sec
Cachee L1 hit: 17µs

H33 CollectiveAuthority Pipeline (AWS Graviton4)

OperationLatencyNotes
BFV Encrypt~700µsClient-side encryption
FHE Distance (encrypted)~145µsMatching in encrypted space
k-of-n Threshold Decrypt~510µs3-of-5 Shamir, zero exposure
PLOOKUP Prove7.3µs105B proof
Dilithium Sign/Verify~88µsSign ~65µs + Verify ~23µs

Quantum-Resistant Full Stack Benchmarks v7.0

FHE (BFV) + PLOOKUP + Biometrics + Kyber768 + Dilithium3
InstanceRequest TypeLatencyThroughput
c8g.metal-48xl (96 cores)H33-128 Full Auth1.923ms
c8g.metal-48xl (96 cores)H33-128 Full Auth2.7ms~—
c8g.metal-48xl (96 cores)H-256 Full Auth13.6ms
Cachee L1 (Rust engine)Cache GET17µs~59K ops/sec
PQC Operations: Kyber768 57.8µs • Dilithium3 ~88µs (sign+verify) • Total PQC overhead: ~146µs
PLOOKUP: 7.3µs prove (dim=128), ~728ns verify, 105B proof • Daily Capacity: Billions/day at scale

Worker Scaling

WorkersAuth/secScalingPer-Auth
12751x3.64ms
81,4966.1x0.67ms
162,3939.8x0.42ms
322,59910.6x0.38ms
482,82811.6x0.35ms

FHE Authentication v7.0

TierWarm LatencyCold LatencyThroughput
H0 (Turbo Full Match, dev only)212µs~250µs~4,700/sec
H33-128 (CollectiveAuthority) ⭐1.923ms3.18ms
H-256 (CollectiveAuthority, 256-bit NIST L5)13.6ms19.8ms

Quantum Signatures (Dilithium3 - NIST Level 3)

OperationLatency
Key Generation36.6µs
Sign~65µs
Verify~23µs
Full Cycle (Sign + Verify)~88µs
Documentation

API Reference

Complete API documentation for H33's post-quantum authentication platform. Base URL: https://api.h33.ai/v1

Authentication Full Stack Auth Biometrics FHE Zero-Knowledge Quantum Signatures Blockchain KYC/AML Errors

Authentication

All API requests require authentication using your API key in the Authorization header.

HTTP Header
Authorization: Bearer h33_live_xxxxxxxxxxxxxxxxxxxx
ℹ️
API Key Types
h33_live_* - Production keys, full access
h33_test_* - Test keys, sandbox environment (no auths consumed)

Full Stack Auth PATENT PENDING

One API call: biometric + FHE + ZK proof + quantum signature + blockchain attestation.

Biometric APIs

FHE-encrypted biometric enrollment and verification. We never see or store raw biometric data.

POST /biometric/enroll

Enroll a new biometric template (face, voice, fingerprint). Encrypted with FHE before storage.

1 auth
H0
1 auth
H33
POST /biometric/verify POPULAR

Verify biometric against enrolled template. Matching performed entirely on encrypted data.

1.923ms
H33-128 (Zero Exposure)
1 auth
H33

FHE Encryption

Fully Homomorphic Encryption - compute on encrypted data without decrypting.

Mode Latency FHE Security Use Case
H0 212µs ~57-bit ⚠️ Dev/testing only
H33-128 ⭐ 1.923ms 128-bit NIST L1 + Zero Exposure Production default (k-of-n)
H-256 ✓ TBD 256-bit NIST L5 + Zero Exposure NIST L5 (n=16,384) — highest tier
POST /fhe/encrypt

Encrypt data using FHE. Supports BFV (integers) and CKKS (floating point) schemes.

~700µs
H33 (AWS Graviton4)
1 auth
H33
POST /fhe/compute

Perform operations on encrypted data: addition, multiplication, comparison, Euclidean distance.

~145µs
FHE Match

Zero-Knowledge Proofs

Prove statements without revealing underlying data. PLOOKUP for production auth, Circle STARK for infrastructure.

Scheme Proof Size Verify Time Notes
PLOOKUP (Production) 105 bytes ~728ns Production auth ZK. Hash-based, PQ-safe
KZG ~200 bytes ~3ms Biometric ZKP commitment scheme
IPA ~1KB ~10ms No trusted setup, biometric ZKP
POST /zkp/prove

Generate a ZK proof. PLOOKUP for production auth. Prove age, location, credentials without revealing data.

7.3µs
PLOOKUP
105B
Proof Size
POST /zkp/verify

Verify a ZK proof. PLOOKUP verification in 720ns. Returns true if proof is valid.

720ns
PLOOKUP
3.47ms
Circle STARK

Quantum Signatures

NIST FIPS 203/204 compliant post-quantum digital signatures. Dilithium3: Sign ~65µs + Verify ~23µs = ~88µs total.

🔐
Algorithms Supported
CRYSTALS-Dilithium - Primary (FIPS 204) • CRYSTALS-Kyber - Key encapsulation (FIPS 203) • FALCON - Compact signatures
POST /quantum/sign

Sign data using Dilithium3 (NIST Level 3) quantum-resistant algorithm.

~65µs
Sign
1 auth
Per call
POST /quantum/verify

Verify a quantum-resistant signature.

~23µs
Verify
~88µs
Full Cycle

Blockchain Attestation

Immutable records on Solana. ZK-compressed logging (5000x less expensive than raw transactions).

POST /blockchain/attest

Create immutable attestation record. Perfect for audit trails and compliance.

~400ms
Confirmation
1 auth
Cost
POST /blockchain/mint-sbt

Mint a Soulbound Token (non-transferable NFT) for verified identity credentials.

Solana
Network

KYC / AML

Privacy-preserving identity verification with Soulbound NFT issuance.

Package Price Includes
KYC Basic + SBT $49 ID + Selfie + Liveness + Soulbound NFT
KYC Enhanced + SBT $79 Basic + Proof of Address
AML/PEP Screening $19 Sanctions, PEP, Adverse Media
Full Bundle $99 KYC + AML + Soulbound NFT
POST /kyc/verify
JavaScript
const kyc = await h33.kyc.verify({ userId: 'user_123', package: 'full_bundle', // $99 documents: { idFront: idBase64, selfie: selfieBase64 }, walletAddress: 'Gh9ZwE...' // For SBT mint }); // { status: "verified", amlClear: true, zkProof: "0x...", sbtMint: "H33sbt..." }

Error Codes

All API errors return a consistent JSON structure.

Error Response
{ "error": { "code": "QUOTA_EXCEEDED", "message": "Monthly auth quota exceeded" } }
Code HTTP Description
INVALID_API_KEY 401 API key is missing, invalid, or revoked
QUOTA_EXCEEDED 402 Auth quota exceeded for this billing period
RATE_LIMITED 429 Too many requests, slow down
USER_NOT_ENROLLED 404 No biometric template found for user
PROOF_INVALID 400 ZK proof verification failed

Rate Limits

Tier Requests/sec Requests/day
Trial 10 1,000
Starter 10 10,000
Growth 100 100,000
Business+ 500+ Unlimited
SDKs

Native SDKs for every stack

Official client libraries with TypeScript definitions, async/await support, and automatic retries.

Node.js / TypeScript
npm install @h33/client
Python
pip install h33
Go
go get github.com/h33-ai/h33-go
Rust
cargo add h33
React Native
npm install @h33/react-native

Ship military-grade post-quantum encryption this afternoon.

We solved the hard part. 1,000 free auths. Full API access. No credit card required.

Get Free API Key → View Pricing →

Why Quantum Computing Changes Everything

Your current encryption (RSA-2048, ECDSA):

Classical Computer
300 trillion years to break
Quantum (4,000 qubits)
~10 seconds

Shor's algorithm breaks every RSA key, every ECDSA signature, every TLS handshake.

"Harvest Now, Decrypt Later"

Nation-states are recording encrypted traffic TODAY. When quantum arrives, they decrypt everything retroactively.

  • Your 2024 trade secrets
  • Your 2025 M&A communications
  • All exposed.

Timeline

2024: NIST finalizes post-quantum standards ✓
2025-2026: Federal transition mandates begin
2028-2032: Cryptographically relevant quantum expected
2030+: Everything encrypted before transition = compromised

NIST Post-Quantum Cryptography Standards

NIST (National Institute of Standards and Technology) sets cryptographic standards for U.S. government and enterprise.

August 2024 Standards:

FIPS 203ML-KEM (Kyber)Key Exchange
FIPS 204ML-DSA (Dilithium)Signatures
FIPS 202SHA-3Hash Functions

Three NIST-Compliant Tiers ✓

H2 & H33 (N=4096) → 128-bit NIST L1. bfv_params_override ensures Q ≤ HE Standard max.
H-256 (N=16,384) → 256-bit NIST L5. Q=216 bits within HE Standard max of 237 bits.

H0: Non-NIST Dev Tier

H0 (N=1024) dev only (~57-bit). Turbo Full Match: 212µs. No threshold, no PLOOKUP, no Dilithium.

H33/H-256 Zero Exposure:

Biometric NEVER decrypted on any single server. k-of-n threshold decrypt. Dilithium3/Kyber768 = NIST Level 3.

The Math Behind H33

H33-128 FULL AUTH (CollectiveAuthority): 1.923ms

ComponentTime%
BFV Encrypt (Q-128 Standard)~700µs36%
FHE Distance (encrypted space)~145µs8%
k-of-n Threshold Decrypt (3-party Shamir)~510µs27%
Threshold Combine + SHA3~350µs13%
Encode / Normalize / Quantize~300µs11%
PLOOKUP Prove7.3µs<1%
PLOOKUP Verify~728ns<1%
Dilithium Sign + Verify~88µs5%
TOTAL PIPELINE1.923ms100%

c8g.metal-48xl (AWS Graviton4, 96 cores, Neoverse V2). Criterion.rs v0.5, 100+ samples. February 2026. PLOOKUP: 7.3µs prove, ~728ns verify, 105B proof. Zero data exposure: template NEVER decrypted on any single server.

⚡ vs SEAL (same security + zero exposure)

OperationH33SEALAdvantage
Encrypt~700µs500-800µsSEAL slightly faster
Compute + Relinearize~145µs4,720 + 11,900 = 16,620µs
Decrypt~300µs~700µs1.7x faster
FHE-only Total~1,464µs~17,920µs3.1× faster
Zero Data Exposure✓ k-of-n

🔧 vs DIY Cobbled Stack

H33DIYAdvantage
Full Auth1.923ms200-900ms77-346x
First Auth13.6ms1.4-4.2s930-2,800x
Vendors14-6
Integration1 afternoon6-12 months
Zero Exposure

📈 Blink Test

300ms blink ÷ 1.923ms = ~155 full crypto auths per blink (H33-128)
Source: Criterion.rs v0.5, c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). February 13, 2026 | v7.0
Full Benchmark Report →

Performance Benchmarks

Production ARM Hardware · February 2026
0 auth/sec sustained
60-second sustained test. Zero degradation over test duration.
Optimization Journey
SIMD Multiplier
35.9×
32 users per FHE operation
Total Improvement
79.7×
from initial baseline
Total (60s test)
35.2M
authentications
Latency decreases as load increases — SIMD batches fill faster under pressure
Rate
P50 Latency
P50
P95
P99
Single Auth (Unbatched)
1.93ms
Amortized at Scale
1.7µs
Auth/sec
655,775
sustained, 60s test
Daily Capacity
56.7B
per cluster
Yearly Volume
20.7T
authentications
What 655K/sec means for your organization
Regional bank500K customers
All daily logins in 0.8 seconds
500K
National health system50M patients
Every daily authentication in 76 seconds
50M
Global payments network4B cardholders
Every transaction in under 2 hours
4B
US financial systemEvery bank, every credit union
~1B daily auths → 25 minutes
1B
Every number on this page is a measured result from production hardware, not a projection or theoretical estimate.
Hardware
Production ARM server (AWS)
Multi-core, DDR5, no SMT
Production-tuned configuration
Software
Rust 1.93 stable, release build with LTO
ARM NEON SIMD, jemalloc allocator
BFV fully homomorphic encryption (N=4096, 128-bit security)
32-user SIMD packing via CRT batching slots
Test Conditions
60-second sustained throughput (no warmup cherry-picking)
Multi-worker, production configuration
1,366,510 total requests for latency distribution
Zero fallbacks — 100% batch path utilization
Verification
1,627 unit tests passing
300,000 randomized property tests (proptest)
Noise budget validated across full embedding distribution
Criterion.rs statistical benchmarks with 95% confidence intervals