Benchmarks FHE APIs Pricing Token Docs Blog About
Log In Get API Key
🛡️ H33: 780µs • Zero Data Exposure • k-of-n Threshold • Post-Quantum 📜 15 Patent Claims Pending • 1,540 Tests Passing

780µs. Zero data exposure. Military-grade authentication.

The only biometric auth where your template is NEVER decrypted.
k-of-n threshold · Post-quantum · 128-bit NIST L1 FHE security

"If You're Not Quantum Resistant in the Next Few Years, You're Out of Business" Why? →

SEAL: ~6ms. H33: 780µs. Same security + zero exposure. Ship today. What's NIST? →

Microsoft SEAL at N=4096? ~6ms per auth. H33: 780µs. 7.7x faster + zero exposure. See the math →

Ship military-grade Quantum Resistant Encryption this afternoon.
FHE-encrypted biometrics. Zero-knowledge proofs. Quantum signatures. One API call.

173µs
H0 (Dev)
780µs
H33 (128-bit NIST L1)
NIST L5
H-256 (256-bit)
7.7x
vs SEAL
Zero Exposure
Guaranteed
Blink Test: 300ms blink ÷ 780µs = ~385 auths per blink. The only auth where your biometric is NEVER decrypted.

Performance Modes v5.0

Mode Latency Security NIST Level
H0 173µs ~57-bit Dev Only
H1 ~450µs ~85-bit Fast (non-NIST)
H2 ✓ 644µs 128-bit NIST L1 Deep Circuits
H33 ⭐ 780µs 128-bit NIST L1 Zero Exposure
H-256 ✓ TBD 256-bit (NIST L5) Zero Exposure

H0 (N=1024) dev only (~57-bit). H1 (N=2048) fast non-NIST. H2, H33, H-256 are NIST-compliant: H2/H33 (N=4096) NIST L1 128-bit; H-256 (N=16,384) NIST L5 256-bit. All use bfv_params_override for compliance.

H0 Mode Breakdown (173µs) — Dev Only

FHE Encrypt (BFV, N=1024) ~105µs 60.7%
FHE Distance Compute ~40µs 23.1%
FHE Decrypt ~20µs 11.6%
PQC Overhead ~8µs 4.6%
TOTAL 173µs 100%

H33 CollectiveAuthority (780µs) — 128-bit NIST L1 FHE + Zero Exposure

BFV Encrypt 128.5µs 16%
FHE Distance (encrypted space) 48.1µs 6%
k-of-n Threshold Decrypt (3-of-5) ~350µs 45%
PLOOKUP Prove 23.8µs 3%
Dilithium Sign/Verify ~163µs 21%
Cachee Lookup ~16µs 2%
Network/orchestration overhead ~50µs 6%
H33 TOTAL (w/ k-of-n) 780µs Zero Exposure
ZK Verification (Production: PLOOKUP)
PLOOKUP Verify: 715ns | Prove: 23.8µs | Proof: 105B
Legacy options: KZG 108ms (96B) | IPA 170ms (944B) | FRI 30ms (47KB)
Blink = 300,000µs
H33: 300,000 ÷ 780 = ~385 auths per blink
H-256: 300,000 ÷ 1,500 = ~200 auths per blink
vs SEAL (N=4096): ~6ms | H33 (N=4096): 780µs = 7.7× faster + NIST L1 + zero exposure

Benchmarks: Apple M4 Max. AWS c7i.metal projections. Criterion.rs v0.5, 100+ samples. February 2026 | v3.7
Note: H33/H2 upgraded to N=4096 for NIST L1 compliance. Latencies being re-benchmarked.

full-stack-auth.js
// Ship quantum-resistant auth this afternoon const result = await h33.auth.verify({ userId: 'user_123', biometric: faceData // H33 default: 780µs, 128-bit NIST L1 FHE, zero exposure }); // Maximum security? One parameter. const secure = await h33.auth.verify({ userId: 'user_123', biometric: faceData, mode: 'h-256' // n=16,384, Q=216 → TRUE 256-bit NIST L5 ✓ });
Performance

780µs. Zero Data Exposure. k-of-n Threshold.

Benchmarked on AWS c7i.4xlarge (16 vCPU). Criterion.rs measurements. February 4, 2026 | v4.1

🛡️
H33 (Zero Exposure)
780µs
k-of-n threshold, 128-bit NIST L1
🔐
H-256 (Max Mode)
~1.5ms
N=16,384, NIST L5 ✓
🔐
PQC Total
~220µs
Kyber768 + Dilithium3
H0 Mode
173µs
~57-bit (dev/testing)
🔐
+PLOOKUP Prove
23.8µs
verify: 715ns
🚀
vs Microsoft SEAL
7.7x
faster + zero exposure
780µs post-quantum authentication with zero data exposure
H33 CollectiveAuthority: FHE matching in encrypted space + k-of-n threshold decrypt + PLOOKUP proof (23.8µs) + Dilithium. Your biometric is NEVER decrypted on any single server.
7.7x
faster than SEAL
A human blink takes 300,000 microseconds.
In that time, H33 can complete ~385 full crypto auths (780µs each), or ~11,700 cached verifications (25.6µs Cachee L1 hit).
385x
crypto auths per blink
Speed Comparison

H33 vs Microsoft SEAL

Same security. Different trust model. 7.7x faster + zero data exposure. k-of-n threshold means no single server sees your plaintext.

Same Security, Different Speed

Operation SEAL BFV H33 H33 H33 Advantage
Encrypt 500-800 µs 506 µs Comparable
Square/Multiply 4,720 µs ~40 µs 118x faster
Relinearize 11,900 µs n/a (no relin) ∞ (skipped)
Full Auth Pipeline ~6,000 µs 866 µs 7.7x faster

Why the difference? SEAL is a general-purpose FHE library. H33 is purpose-built for authentication: shallow circuits, aggressive batching, no relinearization needed. Same BFV scheme, same security—just optimized for one use case.

Full Stack Auth Speed Comparison

Stack H33 Competitors (Combined) H33 Advantage
H33 (CollectiveAuthority, 128-bit NIST L1) 780µs ~6,000µs (SEAL alone) 7.7x faster + zero exposure
H2 (FHE Only, N=4096, 128-bit NIST L1) 644µs ~6,000µs (SEAL) 9.3x faster
ZK Proof (PLOOKUP) 23.8µs ~20ms+ (STARK alternatives) ~840x faster

Individual Component Breakdown (v4.1)

Component H33 Alternative Notes
FHE Encrypt (H33 N=4096) 506µs SEAL: 500-800µs Comparable encryption speed
H33 Full Auth (CollectiveAuthority) 780µs SEAL: ~6,000µs 7.7x faster + zero data exposure.
FHE Full Auth (H-256) ~1.5ms SEAL: ~15-20ms 256-bit NIST L5. Highest NIST tier (L5). Zero exposure.
ZK Proof (PLOOKUP) 23.8µs STARK: 20ms+ Production ZK. 105B proof. 715ns verify. PQ-safe.
Kyber768 Full KEM 57.8µs liboqs: ~60µs Keygen 16.8µs + Encap 21.4µs + Decap 19.6µs
Dilithium3 Sign+Verify ~163µs liboqs: ~180µs Sign 123.1µs + Verify 39.7µs
Full Crypto Auth (H33 CollectiveAuthority) 780µs ~6,000µs (SEAL FHE alone) 7.7x faster + zero data exposure.

Measured on AWS c7i.4xlarge (16 vCPU). Criterion.rs v0.5, 100 samples per benchmark. February 2026.

Why H33

780µs. Zero Data Exposure. Post-Quantum.

The only biometric auth where your template is NEVER decrypted. H33 CollectiveAuthority uses k-of-n threshold decrypt so no single server ever sees plaintext. PLOOKUP prove: 23.8µs, verify: 715ns. 7.7x faster than Microsoft SEAL.

780µs
H33 Full Auth
128.5µs
BFV Encrypt
23.8µs
PLOOKUP Prove
7.7x
vs SEAL
Capability H33 (Feb 2026 v4.1) Industry Best H33 Advantage
H0 Mode 173µs No comparison ~57-bit security (dev/testing)
H33 (CollectiveAuthority, N=4096) 780µs SEAL: ~6,000µs 7.7x faster + zero exposure
Merkle Verify (cached) 25.5µs ~100-500µs 4-20x faster
PLOOKUP ZK Prove 23.8µs ~20ms+ (STARK) ~840x faster. 105B proof.
H33 Full Auth (CollectiveAuthority) 780µs ~6,000µs (SEAL alone) Zero data exposure + k-of-n
Dilithium3 (NIST L3) 163µs liboqs: ~180µs Sign 123.1µs + Verify 39.7µs
Auths Per Blink ~385x crypto auths N/A 300,000µs ÷ 780µs
Throughput (192 vCPU) 528K crypto/sec No comparable offering Full FHE + PLOOKUP + PQC
Cold Start (Full PQC) ~220µs N/A First authentication
PQC Overhead ~220µs N/A Kyber768 57.8µs + Dilithium3 163µs
Cache Read Throughput 1.2M/sec ~100K/sec typical Cachee L1 cluster, 100% hit rate

c7i.4xlarge (16 vCPU) benchmarks: January 2026. c7i.48xlarge (192 vCPU) benchmarks: February 2, 2026. Full benchmark reports available.

Cryptographic Specifications

NIST Level 3 Post-Quantum Cryptography

Every authentication is protected by formally verified, standards-compliant cryptographic primitives.

🔐

FHE: BFV Scheme

Scheme: Brakerski/Fan-Vercauteren
Ring Dimension: N = 4,096 (H33/H2 NIST L1)
Coefficient Modulus: Q ≤ 109 bits (bfv_params_override)
Plaintext Modulus: t = 65,537 (H33/H2/H-256)
Security Level: 128-bit NIST L1
✓ Three NIST-compliant tiers: H-256 (L5), H33 (L1), H2 (L1)
🔑

Kyber768 (ML-KEM)

Standard: FIPS 203
Security Level: NIST Level 3 (AES-192)
Public Key: 1,184 bytes
Ciphertext: 1,088 bytes
Encap + Decap: 41µs
✍️

Dilithium3 (ML-DSA)

Standard: FIPS 204
Security Level: NIST Level 3 (AES-192)
Public Key: 1,952 bytes
Signature: 3,309 bytes
Sign + Verify: ~163µs (123.1 + 39.7)
🔐

ZK: PLOOKUP PRODUCTION

Mechanism: SHA3-256 hash chains
Prove: 23.8µs
Verify: 715ns
Proof Size: 105 bytes
Post-Quantum: Yes (hash-based)

PLOOKUP Production ZK v5.0

Hash-based PLOOKUP for production auth. SHA3-256 hash chains + lookup table range checks. Post-quantum safe.

23.8µs
PLOOKUP Prove
715ns
PLOOKUP Verify
105B
PLOOKUP Proof Size
55K/sec
PLOOKUP Throughput
780µs
H33 Full Auth
528K/sec
Crypto Throughput (192 vCPU)
418K/sec
Cached Sessions
Full Security Parameters Appendix v3.7 →
API Services

The full post-quantum stack. One API.

FHE biometrics, ZK proofs, quantum signatures, blockchain attestation. Everything you need for privacy-preserving authentication.

🧬
FHE Biometrics
Face, voice, fingerprint matching on encrypted data. k-of-n threshold decrypt. 128.5µs BFV encrypt + 48.1µs FHE distance (c7i.metal). 7.7x faster than SEAL + zero exposure.
POST /biometric/enroll POST /biometric/verify POST /auth/incremental
NEW
🔢
CKKS FHE
Floating-point homomorphic encryption. Compute on encrypted real numbers. 128/192/256-bit security levels.
POST /fhe/ckks/keygen POST /fhe/ckks/encrypt POST /fhe/ckks/decrypt POST /fhe/ckks/add POST /fhe/ckks/multiply POST /fhe/ckks/rescale
NEW
🔣
TFHE
Boolean/integer homomorphic encryption. Encrypted logic gates and comparisons. Ultra-fast bootstrapping.
POST /fhe/tfhe/keygen POST /fhe/tfhe/encrypt/bool POST /fhe/tfhe/encrypt/int POST /fhe/tfhe/decrypt/bool POST /fhe/tfhe/decrypt/int POST /fhe/tfhe/and POST /fhe/tfhe/or POST /fhe/tfhe/xor POST /fhe/tfhe/not POST /fhe/tfhe/compare
🔒
Zero-Knowledge Proofs
Prove identity, age, location without revealing data. Custom circuits supported.
POST /zkp/prove POST /zkp/verify
🔐
Quantum Signatures
CRYSTALS-Dilithium & Kyber. NIST FIPS 203/204 compliant. 163µs sign+verify. 104x pool speedup.
POST /quantum/sign POST /quantum/verify
⛓️
Blockchain Attestation
Solana soulbound NFTs. Immutable audit trails. ZK-compressed logging (5000x less expensive).
POST /blockchain/attest POST /blockchain/mint-sbt
NEW
👻
Invisible Auth
Zero-transmission authentication. No codes displayed. Hardware-secured invisible keys.
POST /auth/invisible POST /auth/session
PATENT
🛡️
Estate Fraud Detection
Behavioral shift detection from deceased baselines. Beneficiary collusion detection. Court-admissible evidence.
POST /fraud/estate/analyze GET /fraud/evidence
🏛️
KYC / AML
Privacy-preserving identity verification. ZK proofs of eligibility without exposing documents.
POST /kyc/verify POST /aml/screen
🧠
Continuous Auth
Multi-modal fusion: keystroke, mouse, face, voice. LSTM behavioral modeling. 99.2% attack detection.
WS /auth/continuous POST /auth/behavioral
📜 15 Patent Claims Pending

7 Core Innovations

Protected intellectual property covering the complete post-quantum authentication stack.

1
Homomorphic Biometric Matching
Euclidean distance on encrypted templates. Zero data exposure. BFV scheme with SIMD batching.
2
Zero-Knowledge Identity Proofs
Custom R1CS circuits for age, location, credential verification. 40% constraint reduction.
3
Continuous Multi-Modal Fusion
LSTM temporal modeling. Keystroke, mouse, face, voice, physiological signals. 94.7% accuracy.
4
Quantum-Resistant Architecture
Kyber, Dilithium, FALCON with automated migration. 30+ year quantum resistance.
5
Estate Fraud Detection
Behavioral shift analysis from deceased baselines. Collusion detection. Legal evidence generation.
6
ML Threat Attribution
Ensemble classification for attack source identification. Campaign tracking. 89-95% accuracy.
7
Blockchain Compliance
Smart contracts for GDPR/HIPAA. ZK-compressed logging. 5000x cost reduction.
+
Invisible Authentication
Zero-transmission auth. Hardware-secured keys. Zero-knowledge registration.
✓ Cancel anytime • Credits roll over 12 months • Annual: 2 months free

Monthly subscription pricing

Monthly credit allotment. Upgrade or downgrade anytime. Annual plans get 2 months free (~17% off).

Free
$0
500 credits/mo
50 H33 auths/mo
All APIs
H0 mode only
5 req/sec
Production use
Starter
$349/mo
5,000 credits/mo
500 H33 auths/mo
All tiers (H0-H256)
10 req/sec
Email support
Webhooks
Business
$2,499/mo
50,000 credits/mo
5,000 H33 auths/mo
200 req/sec
99.9% SLA
20 API keys
4hr support
Growth
$6,999/mo
150,000 credits/mo
15,000 H33 auths/mo • 500 req/sec
Scale
$17,999/mo
400,000 credits/mo
40,000 H33 auths/mo • SOC 2
Enterprise
$49,999/mo
1.25M credits/mo
125K H33 auths/mo • Dedicated AM
Enterprise+
$119,999/mo
5M credits/mo
500K H33 auths/mo • Premium SLA
Government
Contact Us
H-256 tier • FedRAMP

Credit Cost per Authentication

Credits scale with security level • Higher security = more compute = more credits
Tier Credits/Auth Latency Description
H0 ⚠️ 1 173µs Dev/testing only (~57-bit)
H1 3 ~480µs Lightweight FHE (~86-bit)
H2 ✓ 4 644µs Full FHE, deep circuits (NIST L1)
H33 ⭐ 10 780µs Zero exposure flagship (NIST L1)
H-256 ✓ 25 ~1.5ms NIST L5 + k-of-n threshold

KYC / Identity (Fixed Pricing)

$49
KYC Basic + SBT
ID, Selfie, Liveness, Soulbound NFT mint
$79
KYC Enhanced + SBT
+ Proof of Address verification
$19
AML/PEP Screening
Sanctions, PEP, Adverse Media
$99
Full Bundle
KYC + AML + Soulbound NFT

All KYC includes: FHE-encrypted biometrics, ZK proof, quantum signatures, Solana soulbound NFT.

Security

Enterprise-grade. Formally verified.

Post-quantum cryptography, 16 mathematical proofs, 7 defense layers. Security that doesn't slow you down.

9.9/10
Enterprise Security Rating
View Testing Methodology →
0
Critical Vulns
16
Kani Proofs
7
Defense Layers
99.2%
Attack Detection

7-Layer Defense in Depth

Layer 7: Post-Quantum Cryptography Dilithium3 + Kyber768 • NIST Level 3
Layer 6: Zero-Knowledge Proofs PLOOKUP • Privacy without exposure
Layer 5: Homomorphic Encryption BFV/CKKS • Compute on encrypted data
Layer 4: Hardware Security (TEE) Intel SGX • Fortanix EDP
Layer 3: Formal Verification 16 Kani Proofs • Mathematical guarantees
Layer 2: Network Security WAF • DDoS • mTLS • Segmentation
Layer 1: Infrastructure AWS • VPC • IAM • CloudTrail

Compliance Ready

🏥
HIPAA
🇪🇺
GDPR
📊
SOC 2
💳
PCI DSS
🔒
ISO 27001
🏛️
FedRAMP
Benchmarks

Real-world performance. Independently verifiable.

All benchmarks on AWS c7i.48xlarge (192 vCPU Xeon 8488C, 384GB RAM) + ElastiCache r6g.xlarge. February 2, 2026 results. Reproducible with our open-source test suite.

Instance
c7i.metal-48xl
192 vCPU • 384GB • AVX2
Full Crypto Auth
528K/sec
FHE + PLOOKUP + Dilithium
Cached Sessions
418K/sec
Cachee L1 hit: 25.6µs

H33 CollectiveAuthority Pipeline (c7i.metal)

OperationLatencyNotes
BFV Encrypt128.5µsClient-side encryption
FHE Distance (encrypted)48.1µsMatching in encrypted space
k-of-n Threshold Decrypt~350µs3-of-5 Shamir, zero exposure
PLOOKUP Prove23.8µs105B proof
Dilithium Sign/Verify~163µsTotal: 780µs

Quantum-Resistant Full Stack Benchmarks v5.0

FHE (BFV) + PLOOKUP + Biometrics + Kyber768 + Dilithium3
InstanceRequest TypeLatencyThroughput
c7i.metal-48xl (192 vCPU)H33 Full Auth (CollectiveAuthority)780µs~246K/sec
c7i.metal-48xl (192 vCPU)H2 Full Auth (FHE Only)644µs~298K/sec
c7i.metal-48xl (192 vCPU)Cached Session25.6µs418K/sec
PQC Operations: Kyber768 57.8µs • Dilithium3 163µs (sign+verify) • Total PQC overhead: ~220µs
Memory Pooling: 28% FHE latency reduction (317µs encrypt, was 435µs) • PLOOKUP: 23.8µs prove, 715ns verify

Batch Authentication Scaling

UsersTotal TimePer User
10757µs75µs
10056µs<1µs
50094µs<1µs
1,000116µs<1µs

FHE Authentication v4.1

OperationLatencyThroughput
H0 (FHE Only, dev)173µs~5,780 ops/sec
H2 (FHE Only, deep circuits)644µs~1,553 ops/sec
H33 (CollectiveAuthority) ⭐780µs~1,283 ops/sec
H-256 (CollectiveAuthority, 256-bit NIST L5)~1.5ms~667 ops/sec

Quantum Signatures (Dilithium3 - NIST Level 3)

OperationLatency
Key Generation36.6µs
Sign123.1µs
Verify39.7µs
Pool Keygen0.35µs (104x)
Documentation

API Reference

Complete API documentation for H33's post-quantum authentication platform. Base URL: https://api.h33.ai/v1

Authentication Full Stack Auth Biometrics FHE Zero-Knowledge Quantum Signatures Blockchain KYC/AML Errors

Authentication

All API requests require authentication using your API key in the Authorization header.

HTTP Header
Authorization: Bearer h33_live_xxxxxxxxxxxxxxxxxxxx
ℹ️
API Key Types
h33_live_* - Production keys, full access
h33_test_* - Test keys, sandbox environment (no credits consumed)

Full Stack Auth PATENT PENDING

One API call: biometric + FHE + ZK proof + quantum signature + blockchain attestation.

Biometric APIs

FHE-encrypted biometric enrollment and verification. We never see or store raw biometric data.

POST /biometric/enroll

Enroll a new biometric template (face, voice, fingerprint). Encrypted with FHE before storage.

5 credits
H0
3 credits
H33
POST /biometric/verify POPULAR

Verify biometric against enrolled template. Matching performed entirely on encrypted data.

780µs
H33 (Zero Exposure)
1.5 credits
H33

FHE Encryption

Fully Homomorphic Encryption - compute on encrypted data without decrypting.

Mode Latency FHE Security Use Case
H0 173µs ~57-bit ⚠️ Dev/testing only
H33 ⭐ 780µs 128-bit NIST L1 + Zero Exposure Production default (k-of-n)
H-256 ✓ TBD 256-bit NIST L5 + Zero Exposure NIST L5 (n=16,384) — highest tier
POST /fhe/encrypt

Encrypt data using FHE. Supports BFV (integers) and CKKS (floating point) schemes.

128.5µs
H33 (c7i.metal)
1.5 credits
H33
POST /fhe/compute

Perform operations on encrypted data: addition, multiplication, comparison, Euclidean distance.

125µs
FHE Match

Zero-Knowledge Proofs

Prove statements without revealing underlying data. PLOOKUP for production auth, Circle STARK for infrastructure.

Scheme Proof Size Verify Time Notes
PLOOKUP (Production) 105 bytes 715ns Production auth ZK. Hash-based, PQ-safe
KZG (Groth16) ~200 bytes ~3ms Smallest proofs, trusted setup
IPA (PLONK) ~1KB ~10ms No trusted setup
FRI (Circle STARK) ~14KB ~21µs verify Infrastructure only, not in auth path
POST /zkp/prove

Generate a ZK proof. PLOOKUP for production auth. Prove age, location, credentials without revealing data.

23.8µs
PLOOKUP
105B
Proof Size
POST /zkp/verify

Verify a ZK proof. PLOOKUP verification in 715ns. Returns true if proof is valid.

715ns
PLOOKUP
3.47ms
Circle STARK

Quantum Signatures

NIST FIPS 203/204 compliant post-quantum digital signatures. Dilithium3: Sign 123.1µs + Verify 39.7µs = 163µs total.

🔐
Algorithms Supported
CRYSTALS-Dilithium - Primary (FIPS 204) • CRYSTALS-Kyber - Key encapsulation (FIPS 203) • FALCON - Compact signatures
POST /quantum/sign

Sign data using Dilithium3 (NIST Level 3) quantum-resistant algorithm.

123.1µs
Sign
3 credits
H0
POST /quantum/verify

Verify a quantum-resistant signature.

39.7µs
Verify
163µs
Full Cycle

Blockchain Attestation

Immutable records on Solana. ZK-compressed logging (5000x less expensive than raw transactions).

POST /blockchain/attest

Create immutable attestation record. Perfect for audit trails and compliance.

~400ms
Confirmation
1 credit
Cost
POST /blockchain/mint-sbt

Mint a Soulbound Token (non-transferable NFT) for verified identity credentials.

Solana
Network

KYC / AML

Privacy-preserving identity verification with Soulbound NFT issuance.

Package Price Includes
KYC Basic + SBT $49 ID + Selfie + Liveness + Soulbound NFT
KYC Enhanced + SBT $79 Basic + Proof of Address
AML/PEP Screening $19 Sanctions, PEP, Adverse Media
Full Bundle $99 KYC + AML + Soulbound NFT
POST /kyc/verify
JavaScript
const kyc = await h33.kyc.verify({ userId: 'user_123', package: 'full_bundle', // $99 documents: { idFront: idBase64, selfie: selfieBase64 }, walletAddress: 'Gh9ZwE...' // For SBT mint }); // { status: "verified", amlClear: true, zkProof: "0x...", sbtMint: "H33sbt..." }

Error Codes

All API errors return a consistent JSON structure.

Error Response
{ "error": { "code": "INSUFFICIENT_CREDITS", "message": "Account has 12 credits, operation requires 15" } }
Code HTTP Description
INVALID_API_KEY 401 API key is missing, invalid, or revoked
INSUFFICIENT_CREDITS 402 Not enough credits for the operation
RATE_LIMITED 429 Too many requests, slow down
USER_NOT_ENROLLED 404 No biometric template found for user
PROOF_INVALID 400 ZK proof verification failed

Rate Limits

Tier Requests/sec Requests/day
Trial 10 1,000
Starter 10 10,000
Growth 100 100,000
Business+ 500+ Unlimited
SDKs

Native SDKs for every stack

Official client libraries with TypeScript definitions, async/await support, and automatic retries.

Node.js / TypeScript
npm install @h33/client
Python
pip install h33
Go
go get github.com/h33-ai/h33-go
Rust
cargo add h33
React Native
npm install @h33/react-native

Ship military-grade post-quantum encryption this afternoon.

We solved the hard part. 500 free credits. Full API access. No credit card required.

Get Free API Key → Talk to Sales

Why Quantum Computing Changes Everything

Your current encryption (RSA-2048, ECDSA):

Classical Computer
300 trillion years to break
Quantum (4,000 qubits)
~10 seconds

Shor's algorithm breaks every RSA key, every ECDSA signature, every TLS handshake.

"Harvest Now, Decrypt Later"

Nation-states are recording encrypted traffic TODAY. When quantum arrives, they decrypt everything retroactively.

  • Your 2024 trade secrets
  • Your 2025 M&A communications
  • All exposed.

Timeline

2024: NIST finalizes post-quantum standards ✓
2025-2026: Federal transition mandates begin
2028-2032: Cryptographically relevant quantum expected
2030+: Everything encrypted before transition = compromised

NIST Post-Quantum Cryptography Standards

NIST (National Institute of Standards and Technology) sets cryptographic standards for U.S. government and enterprise.

August 2024 Standards:

FIPS 203ML-KEM (Kyber)Key Exchange
FIPS 204ML-DSA (Dilithium)Signatures
FIPS 202SHA-3Hash Functions

Three NIST-Compliant Tiers ✓

H2 & H33 (N=4096) → 128-bit NIST L1. bfv_params_override ensures Q ≤ HE Standard max.
H-256 (N=16,384) → 256-bit NIST L5. Q=216 bits within HE Standard max of 237 bits.

H1/H0: Non-NIST Tiers

H1 (N=2048) fast non-NIST (~85-bit). H0 (N=1024) dev only (~57-bit).

H33/H-256 Zero Exposure:

Biometric NEVER decrypted on any single server. k-of-n threshold decrypt. Dilithium3/Kyber768 = NIST Level 3.

The Math Behind H33

H33 FULL AUTH (CollectiveAuthority): 780µs

ComponentTime%
BFV Encrypt128.5µs16%
FHE Distance (encrypted space)48.1µs6%
k-of-n Threshold Decrypt (3-of-5)~350µs45%
PLOOKUP Prove23.8µs3%
PLOOKUP Verify0.7µs~0%
Dilithium Sign/Verify~163µs21%
Cachee Lookup~16µs2%
TOTAL780µs100%

c7i.metal-48xl (192 vCPU). PLOOKUP: 23.8µs prove, 715ns verify, 105B proof. Zero data exposure: template NEVER decrypted on any single server.

⚡ vs SEAL (same security + zero exposure)

OperationH33SEALAdvantage
Encrypt506µs500-800µsComparable
Square/Multiply~40µs4,720µs118x
Full Auth780µs~6,000µs7.7x
Zero Data Exposure✓ k-of-n

🔧 vs DIY Cobbled Stack

H33DIYAdvantage
Full Auth780µs200-900ms250-1,150x
First Auth~1.5ms1.4-4.2s930-2,800x
Vendors14-6
Integration1 afternoon6-12 months
Zero Exposure

📈 Blink Test

300ms blink ÷ 780µs = ~385 auths per blink (H33)
Source: Criterion.rs v0.5, AWS c7i.4xlarge, February 4, 2026 | v4.1
Full Benchmark Report →