Benchmarks FHE APIs Pricing Token Docs Blog About
Log In Get API Key
🔐 1.75ms NIST Auth • PQC + FHE • 115-515x vs DIY • 29-34x vs SEAL 📜 15 Patent Claims Pending

1.75ms. NIST-compliant quantum-resistant auth.

"If You're Not Quantum Resistant in the Next Few Years, You're Out of Business" Why? →

NIST-Compliant in 1.75ms. Or 650µs if you need speed. What's NIST? →

DIY with SEAL + liboqs + ZK + biometrics? 200-900ms per auth. We're 115-515x faster. See the math →

Ship military-grade Quantum Resistant Encryption this afternoon.
One API call does it all—or customize for your own needs.

1.75ms
NIST Auth
650µs
Turbo
115-515x
vs DIY
29-34x
vs SEAL
128-bit
NIST L1
Blink Test: 300ms blink ÷ 1.75ms = 171 auths per blink. The only integrated PQC + FHE + Biometric provider.

What's Inside 1.75ms (NIST-Compliant) v4.0

NIST-compliant quantum-resistant authentication includes:

Component Time %
PQC Layer (NIST Level 3) — 236µs
ML-KEM Encapsulate 21.4µs 1%
ML-KEM Decapsulate 19.6µs 1%
ML-DSA Sign (×2) ~130µs 7%
ML-DSA Verify (×2) ~65µs 4%
FHE Layer (NIST 128-bit, N=4096) — 1,436µs ◄ BOTTLENECK
FHE Encrypt (N=4096) 1,070µs 61%
FHE Compute (distance) 133µs 8%
FHE Decrypt 233µs 13%
Serialization — 75µs
TOTAL CRYPTO 1,747µs (1.75ms) 100%
Optional Add-ons:
+ STARK audit trail: +1.5ms → 3.25ms total
+ Blockchain (Solana): +800ms → ~1 sec total
Blink = 300,000µs
300,000 ÷ 1,747 = 171 NIST auths per blink
Microsoft SEAL alone: ~50-60ms FHE → H33 is 29-34x faster

Measured on AWS c7i.4xlarge (16 vCPU, Intel Xeon Platinum 8488C). Criterion.rs v0.5, 100 samples. February 4, 2026 | v4.0.

full-stack-auth.js
// Ship quantum-resistant auth this afternoon const result = await h33.auth.verify({ userId: 'user_123', biometric: faceData // NIST-compliant by default (1.75ms, 128-bit) }); // Need more speed? One parameter. const fast = await h33.auth.verify({ userId: 'user_123', biometric: faceData, mode: 'turbo' // ~650µs, ~100-bit });
Performance

1.75ms. Full NIST-compliant stack.

Benchmarked on AWS c7i.4xlarge (16 vCPU). Criterion.rs measurements. February 4, 2026 | v4.0

🔒
NIST Auth
1.75ms
PQC+FHE (128-bit)
🧬
FHE Standard
1.43ms
N=4096, NIST 128-bit
🔐
PQC Total
236µs
NIST Level 3
Turbo Mode
~650µs
~100-bit (opt-in)
🔐
+STARK (Optional)
+1.5ms
→ 3.25ms total
🚀
vs Microsoft SEAL
29-34x
faster (verified)
1.75ms per NIST-compliant authentication.
Includes: PQC (236µs) + FHE Standard (1.43ms) + Serialization (75µs) = 1.75ms. +STARK audit trail optional (+1.5ms).
29-34x
faster than SEAL
A human blink takes 300,000 microseconds.
In that time, H33 can complete 171 NIST-compliant auths (1.75ms), ~450 Turbo auths (~650µs), or 11,764 cached verifications (25.5µs).
171x
NIST auth per blink
Speed Comparison

Full Stack Auth Speed Comparison

29-34x faster than Microsoft SEAL at equivalent security. One API vs months of integration work.

Stack H33 Competitors (Combined) H33 Advantage
NIST Auth (PQC + FHE + Biometric) 1.75ms (NIST-compliant) 50-60ms (SEAL alone) 29-34x faster
FHE Only (N=4096, 128-bit) 1.43ms 50-60ms (SEAL) 35-42x faster
STARK Full Proof ~1.5ms ~20ms+ (build) ~13x faster

Individual Component Breakdown (v4.0)

Component H33 Alternative Notes
FHE Encryption (Standard N=4096) 1.07ms SEAL: 40-50ms 37-47x faster at equivalent 128-bit security
FHE Full Auth (Standard) 1.43ms SEAL: 50-60ms 35-42x faster. NIST 128-bit compliant.
STARK Full Proof ~1.5ms RISC Zero: 2.5–15s Circle STARK / M31. ~100-bit soundness.
Kyber768 Full KEM 57.8µs liboqs: ~60µs Keygen 16.8µs + Encap 21.4µs + Decap 19.6µs
Dilithium3 Sign+Verify ~111µs liboqs: ~150µs Sign 78µs (worst) + Verify 32.6µs
Integrated Stack (NIST) 1.75ms 50-60ms (SEAL FHE alone) 29-34x faster. Only integrated provider.

Measured on AWS c7i.4xlarge (16 vCPU). Criterion.rs v0.5, 100 samples per benchmark. February 2026.

Why H33

1.75ms. NIST-compliant. Complete stack.

The only production API combining FHE biometric matching (1.43ms) and NIST Level 3 post-quantum cryptography (236µs) in a single 1.75ms call. +STARK audit trail optional (+1.5ms). 29-34x faster than Microsoft SEAL.

1.75ms
NIST Auth
1.43ms
FHE Standard (128-bit)
~1.5ms
STARK Full Proof
28-294x
vs SEAL
Capability H33 (Feb 3, 2026 v4.0) Industry Best H33 Advantage
Turbo Mode ~650µs No comparison ~100-bit security (opt-in)
FHE Standard (N=4096) 1.43ms SEAL: 50-60ms 35-42x faster, 128-bit
Merkle Verify (cached) 25.5µs ~100-500µs 4-20x faster
STARK Full Proof ~1.5ms ~20ms+ (build) ~13x faster
Full Auth (NIST-compliant) 1.75ms 50-60ms (SEAL alone) 29-34x faster
PQC Subtotal (NIST L3) 236µs liboqs: ~150µs Kyber768 + Dilithium3
Auths Per Blink 171x NIST / ~450x Turbo N/A NIST-compliant
Throughput (per core) ~571/sec NIST No comparable offering Only full PQC auth stack
Cold Start (Full PQC) ~170µs N/A First authentication
PQC Overhead ~170µs N/A Kyber768 + Dilithium3 NIST Level 3
Cache Read Throughput 1.2M/sec ~100K/sec typical Cachee L1 cluster, 100% hit rate

c7i.4xlarge (16 vCPU) benchmarks: January 2026. c7i.48xlarge (192 vCPU) benchmarks: February 2, 2026. Full benchmark reports available.

Cryptographic Specifications

NIST Level 3 Post-Quantum Cryptography

Every authentication is protected by formally verified, standards-compliant cryptographic primitives.

🔐

FHE: BFV Scheme

Scheme: Brakerski/Fan-Vercauteren
Ring Dimension: N = 1,024
Coefficient Modulus: [60, 40, 40, 60] bits
Plaintext Modulus: 2^16
Security Level: 128-bit classical
🔑

Kyber768 (ML-KEM)

Standard: FIPS 203
Security Level: NIST Level 3 (AES-192)
Public Key: 1,184 bytes
Ciphertext: 1,088 bytes
Encap + Decap: 32.04µs
✍️

Dilithium3 (ML-DSA)

Standard: FIPS 204
Security Level: NIST Level 3 (AES-192)
Public Key: 1,952 bytes
Signature: 3,293 bytes
Sign + Verify: 145.06µs

STARK: Circle STARK NEW

Field: Mersenne-31 (M31)
Hash: Poseidon2
Commitment: FRI
IVC: Nova accumulation
E2E Enrollment: 60µs

STARK Implementation NEW v4.0

Circle STARK over M31 (Mersenne-31). Poseidon2 hash, FRI commitment, Nova IVC. Optimized for biometric proofs.

591ps
M31 Add (~1.7B/sec)
640ps
M31 Mul (~1.5B/sec)
7.76µs
NTT 1,024
60µs
E2E Enrollment
1.58µs
Poseidon2 Hash/4
25.5µs
Merkle Verify
6.4µs
Nova IVC Accumulate
API Services

The full post-quantum stack. One API.

FHE biometrics, ZK proofs, quantum signatures, blockchain attestation. Everything you need for privacy-preserving authentication.

🧬
FHE Biometrics
Face, voice, fingerprint matching on encrypted data. Zero exposure. 427µs FHE full auth (Turbo). 28% faster with memory pooling.
POST /biometric/enroll POST /biometric/verify POST /auth/incremental
NEW
🔢
CKKS FHE
Floating-point homomorphic encryption. Compute on encrypted real numbers. 128/192/256-bit security levels.
POST /fhe/ckks/keygen POST /fhe/ckks/encrypt POST /fhe/ckks/decrypt POST /fhe/ckks/add POST /fhe/ckks/multiply POST /fhe/ckks/rescale
NEW
🔣
TFHE
Boolean/integer homomorphic encryption. Encrypted logic gates and comparisons. Ultra-fast bootstrapping.
POST /fhe/tfhe/keygen POST /fhe/tfhe/encrypt/bool POST /fhe/tfhe/encrypt/int POST /fhe/tfhe/decrypt/bool POST /fhe/tfhe/decrypt/int POST /fhe/tfhe/and POST /fhe/tfhe/or POST /fhe/tfhe/xor POST /fhe/tfhe/not POST /fhe/tfhe/compare
🔒
Zero-Knowledge Proofs
Prove identity, age, location without revealing data. Custom circuits supported.
POST /zkp/prove POST /zkp/verify
🔐
Quantum Signatures
CRYSTALS-Dilithium & Kyber. NIST FIPS 203/204 compliant. 82µs sign+verify. 104x pool speedup.
POST /quantum/sign POST /quantum/verify
⛓️
Blockchain Attestation
Solana soulbound NFTs. Immutable audit trails. ZK-compressed logging (5000x less expensive).
POST /blockchain/attest POST /blockchain/mint-sbt
NEW
👻
Invisible Auth
Zero-transmission authentication. No codes displayed. Hardware-secured invisible keys.
POST /auth/invisible POST /auth/session
PATENT
🛡️
Estate Fraud Detection
Behavioral shift detection from deceased baselines. Beneficiary collusion detection. Court-admissible evidence.
POST /fraud/estate/analyze GET /fraud/evidence
🏛️
KYC / AML
Privacy-preserving identity verification. ZK proofs of eligibility without exposing documents.
POST /kyc/verify POST /aml/screen
🧠
Continuous Auth
Multi-modal fusion: keystroke, mouse, face, voice. LSTM behavioral modeling. 99.2% attack detection.
WS /auth/continuous POST /auth/behavioral
📜 15 Patent Claims Pending

7 Core Innovations

Protected intellectual property covering the complete post-quantum authentication stack.

1
Homomorphic Biometric Matching
Euclidean distance on encrypted templates. Zero data exposure. BFV scheme with SIMD batching.
2
Zero-Knowledge Identity Proofs
Custom R1CS circuits for age, location, credential verification. 40% constraint reduction.
3
Continuous Multi-Modal Fusion
LSTM temporal modeling. Keystroke, mouse, face, voice, physiological signals. 94.7% accuracy.
4
Quantum-Resistant Architecture
Kyber, Dilithium, FALCON with automated migration. 30+ year quantum resistance.
5
Estate Fraud Detection
Behavioral shift analysis from deceased baselines. Collusion detection. Legal evidence generation.
6
ML Threat Attribution
Ensemble classification for attack source identification. Campaign tracking. 89-95% accuracy.
7
Blockchain Compliance
Smart contracts for GDPR/HIPAA. ZK-compressed logging. 5000x cost reduction.
+
Invisible Authentication
Zero-transmission auth. Hardware-secured keys. Zero-knowledge registration.
✓ Self-serve • No sales calls • Credits never expire

Simple credit-based pricing

Buy credits, use them for any operation. 20% off annual prepay. Overage at 2x pack rate.

Starter
$349
5,000 credits
$0.070/credit
All APIs
Turbo mode (~650µs) ⚠️
10 req/sec
Webhooks
Pro
$2,499
50,000 credits
$0.050/credit
200 req/sec
99.9% SLA
20 API keys
12hr support
Business
$6,999
150,000 credits
$0.047/credit
500 req/sec
SOC 2 report
Unlimited API keys
4hr support
Scale
$17,999
400,000 credits
$0.045/credit
Enterprise
$49,999
1,250,000 credits
$0.040/credit • Dedicated AM
Trial
Free
500 credits • 60 days
50 credits/day limit

Operation Credit Costs

Turbo = fastest (premium) • Standard = default • Precision = full security
Operation Turbo (~650µs) ⚠️ Standard (1.43ms) Precision (5.60ms)
Biometric Verify 3 1.5 2
Biometric Enroll 5 3 4
FHE Encrypt/Decrypt 3 1.5 2
ZK Proof Generate 8 5 6
ZK Proof Verify 2 1 1.5
Blockchain Tx (Solana) 1 1 1
Quantum Sign/Verify 3 2 2
🎯 Full Stack Auth 15 8 12

KYC / Identity (Fixed Pricing)

$49
KYC Basic + SBT
ID, Selfie, Liveness, Soulbound NFT mint
$79
KYC Enhanced + SBT
+ Proof of Address verification
$19
AML/PEP Screening
Sanctions, PEP, Adverse Media
$99
Full Bundle
KYC + AML + Soulbound NFT

All KYC includes: FHE-encrypted biometrics, ZK proof, quantum signatures, Solana soulbound NFT.

Security

Enterprise-grade. Formally verified.

Post-quantum cryptography, 16 mathematical proofs, 7 defense layers. Security that doesn't slow you down.

9.9/10
Enterprise Security Rating
View Testing Methodology →
0
Critical Vulns
16
Kani Proofs
7
Defense Layers
99.2%
Attack Detection

7-Layer Defense in Depth

Layer 7: Post-Quantum Cryptography Dilithium5 + Kyber-1024 • NIST Level 5
Layer 6: Zero-Knowledge Proofs Groth16 • Privacy without exposure
Layer 5: Homomorphic Encryption BFV/CKKS • Compute on encrypted data
Layer 4: Hardware Security (TEE) Intel SGX • Fortanix EDP
Layer 3: Formal Verification 16 Kani Proofs • Mathematical guarantees
Layer 2: Network Security WAF • DDoS • mTLS • Segmentation
Layer 1: Infrastructure AWS • VPC • IAM • CloudTrail

Compliance Ready

🏥
HIPAA
🇪🇺
GDPR
📊
SOC 2
💳
PCI DSS
🔒
ISO 27001
🏛️
FedRAMP
Benchmarks

Real-world performance. Independently verifiable.

All benchmarks on AWS c7i.48xlarge (192 vCPU Xeon 8488C, 384GB RAM) + ElastiCache r6g.xlarge. February 2, 2026 results. Reproducible with our open-source test suite.

Instance
c7i.48xlarge
192 vCPU • 384GB • AVX2
Batch Auth
52.2M/sec
5M users per second peak
Proof Cache
67x faster
32µs vs 2.14ms

NEW: Advanced Optimizations

OperationLatencyImprovement
Session Resume50µsNEW
Delta Auth (5%)<50µs4.4x faster
Proof Verify (cached)32µs67x faster
Batch ZKP (100)35ms73% faster

Quantum-Resistant Full Stack Benchmarks v4.0

FHE (BFV) + STARK + Biometrics + Kyber768 + Dilithium3
InstanceRequest TypeLatencyThroughput
c7i.4xlarge (16 vCPU)Single (cold)~630µs1,587/sec
c7i.4xlarge (16 vCPU)Session~500µs2,000/sec
c7i.48xlarge (192 vCPU)Session PQC70µs~2.3M/sec
PQC Operations: Kyber768 57.8µs • Dilithium3 ~85µs • Total PQC overhead: ~170µs
Memory Pooling: 28% FHE latency reduction (317µs encrypt, was 435µs) • STARK: 60µs E2E (83x improvement)

Batch Authentication Scaling

UsersTotal TimePer User
10757µs75µs
10056µs<1µs
50094µs<1µs
1,000116µs<1µs

FHE Authentication v4.0

OperationLatencyThroughput
FHE Encrypt (Turbo, pooled)317µs28% faster
FHE Full Auth (Turbo)427µs2,341 ops/sec
FHE Full Auth (Standard)1.43ms699 ops/sec
FHE Full Auth (Precision)5.60ms178 ops/sec

Quantum Signatures (Dilithium5 - NIST Level 5)

OperationLatency
Key Generation36.6µs
Sign45µs
Verify36.9µs
Pool Keygen0.35µs (104x)
Documentation

API Reference

Complete API documentation for H33's post-quantum authentication platform. Base URL: https://api.h33.ai/v1

Authentication Full Stack Auth Biometrics FHE Zero-Knowledge Quantum Signatures Blockchain KYC/AML Errors

Authentication

All API requests require authentication using your API key in the Authorization header.

HTTP Header
Authorization: Bearer h33_live_xxxxxxxxxxxxxxxxxxxx
ℹ️
API Key Types
h33_live_* - Production keys, full access
h33_test_* - Test keys, sandbox environment (no credits consumed)

Full Stack Auth PATENT PENDING

One API call: biometric + FHE + ZK proof + quantum signature + blockchain attestation.

Biometric APIs

FHE-encrypted biometric enrollment and verification. We never see or store raw biometric data.

POST /biometric/enroll

Enroll a new biometric template (face, voice, fingerprint). Encrypted with FHE before storage.

5 credits
Turbo
3 credits
Standard
POST /biometric/verify POPULAR

Verify biometric against enrolled template. Matching performed entirely on encrypted data.

427µs
Latency
3 credits
Turbo

FHE Encryption

Fully Homomorphic Encryption - compute on encrypted data without decrypting.

Mode Latency Parameter N Use Case
Turbo 427µs N=1,024 Real-time auth, high throughput
Standard 633µs N=4,096 General purpose (default)
Precision 2.1ms N=16,384 Maximum security
POST /fhe/encrypt

Encrypt data using FHE. Supports BFV (integers) and CKKS (floating point) schemes.

150µs
Latency
3 credits
Turbo
POST /fhe/compute

Perform operations on encrypted data: addition, multiplication, comparison, Euclidean distance.

125µs
FHE Match

Zero-Knowledge Proofs

Prove statements without revealing underlying data. Supports Groth16, PLONK, and STARK.

Scheme Proof Size Verify Time Notes
KZG (Groth16) ~200 bytes ~3ms Smallest proofs, trusted setup
IPA (PLONK) ~1KB ~10ms No trusted setup
FRI (STARK) ~50KB ~50ms Post-quantum safe
POST /zkp/prove

Generate a ZK proof. Prove age, location, credentials without revealing data.

32µs
Cached
8 credits
Turbo
POST /zkp/verify

Verify a ZK proof. Returns true if proof is valid for given public inputs.

3.83ms
Groth16
5ms
H33 STARK

Quantum Signatures

NIST FIPS 203/204 compliant post-quantum digital signatures. ML-KEM 33.3µs keygen, Dilithium 45µs sign.

🔐
Algorithms Supported
CRYSTALS-Dilithium - Primary (FIPS 204) • CRYSTALS-Kyber - Key encapsulation (FIPS 203) • FALCON - Compact signatures
POST /quantum/sign

Sign data using Dilithium5 (NIST Level 5) quantum-resistant algorithm.

45µs
Sign
3 credits
Turbo
POST /quantum/verify

Verify a quantum-resistant signature.

36.9µs
Verify
88µs
Full Cycle

Blockchain Attestation

Immutable records on Solana. ZK-compressed logging (5000x less expensive than raw transactions).

POST /blockchain/attest

Create immutable attestation record. Perfect for audit trails and compliance.

~400ms
Confirmation
1 credit
Cost
POST /blockchain/mint-sbt

Mint a Soulbound Token (non-transferable NFT) for verified identity credentials.

Solana
Network

KYC / AML

Privacy-preserving identity verification with Soulbound NFT issuance.

Package Price Includes
KYC Basic + SBT $49 ID + Selfie + Liveness + Soulbound NFT
KYC Enhanced + SBT $79 Basic + Proof of Address
AML/PEP Screening $19 Sanctions, PEP, Adverse Media
Full Bundle $99 KYC + AML + Soulbound NFT
POST /kyc/verify
JavaScript
const kyc = await h33.kyc.verify({ userId: 'user_123', package: 'full_bundle', // $99 documents: { idFront: idBase64, selfie: selfieBase64 }, walletAddress: 'Gh9ZwE...' // For SBT mint }); // { status: "verified", amlClear: true, zkProof: "0x...", sbtMint: "H33sbt..." }

Error Codes

All API errors return a consistent JSON structure.

Error Response
{ "error": { "code": "INSUFFICIENT_CREDITS", "message": "Account has 12 credits, operation requires 15" } }
Code HTTP Description
INVALID_API_KEY 401 API key is missing, invalid, or revoked
INSUFFICIENT_CREDITS 402 Not enough credits for the operation
RATE_LIMITED 429 Too many requests, slow down
USER_NOT_ENROLLED 404 No biometric template found for user
PROOF_INVALID 400 ZK proof verification failed

Rate Limits

Tier Requests/sec Requests/day
Trial 10 1,000
Starter 50 50,000
Growth 100 100,000
Business+ 500+ Unlimited
SDKs

Native SDKs for every stack

Official client libraries with TypeScript definitions, async/await support, and automatic retries.

Node.js / TypeScript
npm install @h33/client
Python
pip install h33
Go
go get github.com/h33-ai/h33-go
Rust
cargo add h33
React Native
npm install @h33/react-native

Ship military-grade post-quantum encryption this afternoon.

We solved the hard part. 500 free credits. Full API access. No credit card required.

Get Free API Key → Talk to Sales

Why Quantum Computing Changes Everything

Your current encryption (RSA-2048, ECDSA):

Classical Computer
300 trillion years to break
Quantum (4,000 qubits)
~10 seconds

Shor's algorithm breaks every RSA key, every ECDSA signature, every TLS handshake.

"Harvest Now, Decrypt Later"

Nation-states are recording encrypted traffic TODAY. When quantum arrives, they decrypt everything retroactively.

  • Your 2024 trade secrets
  • Your 2025 M&A communications
  • All exposed.

Timeline

2024: NIST finalizes post-quantum standards ✓
2025-2026: Federal transition mandates begin
2028-2032: Cryptographically relevant quantum expected
2030+: Everything encrypted before transition = compromised

NIST Post-Quantum Cryptography Standards

NIST (National Institute of Standards and Technology) sets cryptographic standards for U.S. government and enterprise.

August 2024 Standards:

FIPS 203ML-KEM (Kyber)Key Exchange
FIPS 204ML-DSA (Dilithium)Signatures
FIPS 202SHA-3Hash Functions

128-bit minimum required for compliance.

Many vendors use ~100-bit for speed. They'll fail your audit.

H33 Default:

128-bit, NIST Level 1, FIPS 203/204 ✓

H33 Turbo (opt-in):

~100-bit, 650µs, for ephemeral/gaming/dev

The Math Behind H33

REPEAT AUTH (99% of traffic): 1.75ms

ComponentTime%
ML-KEM (Encap + Decap)41µs2%
ML-DSA (4 ops)195µs11%
FHE Encrypt (N=4096)1,070µs61%
FHE Compute133µs8%
FHE Decrypt233µs13%
Serialization75µs4%
Cachee Lookup2ns~0%
TOTAL1.75ms100%

FIRST AUTH: 818ms (STARK verify paid once, cached forever)

⚡ vs SEAL (same security)

OperationH33SEALAdvantage
FHE Encrypt1.07ms40-50ms37-47x
FHE Multiply133µs~180ms1,353x
Full Auth1.75ms50-60ms29-34x

🔧 vs DIY Cobbled Stack

H33DIYAdvantage
Repeat Auth1.75ms200-900ms115-515x
First Auth818ms1.4-4.2s1.7-5.1x
Vendors14-6
Integration1 afternoon6-12 months

📈 Blink Test

300ms blink ÷ 1.75ms = 171 auths per blink
Source: Criterion.rs v0.5, AWS c7i.4xlarge, February 4, 2026 | v4.0
Full Benchmark Report →