BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
PATENT FILED H33-74 74 bytes. Any computation. Post-quantum attested. Forever.
Whitepaper → Bitcoin ↗
H33 HICS Verified100/100Grade A STARK PROOFDILITHIUM ML-DSA-65Post-Quantum Attested
-74

Every decision your system makes.
Proven. Permanently.

H33 proves the entire chain — data, routing, computation, and result — using post-quantum cryptography.

No plaintext exposure. No infrastructure rebuild.

74 bytes. Any computation. Post-quantum attested.

32 bytes on Bitcoin mainnet · 42 bytes off-chain proof

Read Technical Paper →

What gets proven

Who attested the data
How it was routed
What computation ran
What result was produced

All bound into a 74-byte post-quantum proof.

Independently verifiable. No dependency on H33.

Built for banks, governments, healthcare, blockchain, and high-security applications.

3-of-5 threshold decryption📐🔑 Interactive Shamir demo → · 5+ patents pending · 300+ claims · SOC 2 Type II — 100% Drata, audit closes June 3 · ISO 27001 — 100% Drata, audit closes June 18 · HIPAA via Drata

📐 See green numbers and copper terms? Click any of them to see the interactive proof behind the claim. Every number on this page is measured, not projected.
Free API Key Live Test Product Demos What Hackers See Schedule Demo

Encrypted Systems Have a Trust Boundary

FHE Signing Gap

Encrypted computation produces results. Signature systems need plaintext. Decrypting to sign exposes data.

Unverifiable Pipelines

Multi-step AI and data pipelines have no cryptographic chain of custody. Every handoff is unsigned.

Lost Provenance

Data flows through systems with no proof of who attested it, how it was routed, or what computation ran.

Broken Audit Trails

Compliance requires proof. Current systems produce logs — their own notes about themselves. Not evidence.

H33 closes all four gaps in a single pipeline.

What happens when AI has no cryptographic accountability

TRADING
A trading agent executes a $50M order and claims it received different instructions.
MEDICAL
A medical AI recommends a treatment but can't prove what data it was given.
LEGAL
A legal AI drafts a contract — the output is modified before the lawyer sees it.
FRAUD
A fraud detection system is fed manipulated inputs and produces a clean result.
AUTONOMOUS
An autonomous system causes harm and points to the previous agent in the chain.

Every multi-agent AI pipeline in production operates on trust. That trust has no cryptographic foundation. H33-74 changes that.

From Input to Proof — One Pipeline

Every H33 API call traverses the same seven-stage pipeline. No shortcuts. No optional steps.

1
Data enters
Raw input encrypted on-device before transmission
2
Constraints checked
Domain separation registry validates computation type
3
Routed to engine
FHE-IQ selects optimal engine: BFV, CKKS, TFHE, or BFV-256
4
Computation executes
Encrypted inner product, rotation, threshold decrypt📐🔑 Interactive Shamir demo → — all in FHE
5
Result attested
ZK-STARK proof generated📐🛡️ STARK lookup breakdown →, Dilithium signature applied📐✍️ Batch attestation demo →
6
H33-74 minted
74-byte primitive: 32 on-chain commitment + 42 off-chain proof
7
Anchored to Bitcoin
Taproot P2TR + OP_RETURN. Independently verifiable by any full node.

Total pipeline latency: 1.36ms📐📐 Full benchmark suite → (H33-128📐🔒 128-bit NIST L1 →) · Zero plaintext exposure at any stage.

H33-74

All of This Resolves to 74 Bytes.

Every H33 engine exports trust through the same primitive: H33-74.

Fixed

74 bytes no matter what

Portable

Moves through APIs, storage, devices, ledgers

Post-Quantum

Built for family rotation and long-lived verification

Independent

Verification does not depend on trusting H33

Your data never leaves encryption. The computation happens inside it. The result is post-quantum signed at the moment it's produced. The attestation is 74 bytes regardless of size.

Not compression. Commitment.

74 bytes wears a lot of hats — Address, Packet, FHE Proof, PQ Seal, Chain Commit, Credential

Same 74 bytes. Six simultaneous roles. All networked.

Read the Whitepaper → Explore H33-74 →

Independently verifiable by anyone, anywhere.

VERIFIED ON BITCOIN MAINNET — APRIL 14, 2026
Transaction: 7f8d9ef2...b028b4a7 — Taproot P2TR + OP_RETURN. Standard Bitcoin. No soft fork. No new opcodes. Independently verifiable by any full node worldwide.

Post-Quantum Authentication and Encrypted Computation API📐⚙️ Proprietary engine deep-dive →

One API integrates encrypted computation, proof generation, post-quantum signing, and verification into a single production pipeline.

Authentication Decisions

FHE · ZK · Biometrics

Computation Decisions

BFV · CKKS · TFHE · FHE-IQ

Verification Decisions

STARK Lookup📐🛡️ STARK lookup breakdown → · ZKP-AIR

Multi-Party Decisions

MPC · Agent-74 · PQ Video

All four export trust through H33-74.

AI Blind processes your data without ever seeing it. H33-74 attests the result without decrypting it.

Not a batch job. Not an async queue. Inline, synchronous, every request.

Mode Latency Security Exposure
H0 (Classical) 0.8ms None (quantum-breakable) Full plaintext
H33-128 Zero
H33-256 Zero

Why H33 Is Faster Than Expected

  • Purpose-built engines, not wrapped libraries📐⚙️ Proprietary engine deep-dive →
  • No external FHE/ZK dependencies📐⚙️ Proprietary engine deep-dive →
  • Pipeline-level optimization across all stages
  • Fixed-size trust export through H33-74
Full Pipeline Breakdown — H33-128 (1.36ms)📐🔒 128-bit NIST L1 →
0.42ms 31%
FHE Inner Product + Rotations 0.26ms 19%
0.33ms 24%
<1%
8%
Encode / Normalize / Other ~0.24ms 18%
1.36ms Zero Exposure

Measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2). Criterion.rs v0.5, 100+ samples.

ZK Verification Speed📐🛡️ STARK lookup breakdown →
2.0µs
0.2µs
ZKP-AIR Prove ~5µs
ZKP-AIR Verify ~1µs
H33 vs Microsoft SEAL📐📐 Full benchmark suite →
Operation SEAL H33 Factor
~2.1ms 0.42ms 5x
Multiply ~6.5ms 0.26ms 25x
N/A 1.36ms Unique

SEAL does not include ZK proofs📐🛡️ STARK lookup breakdown →, PQ signatures📐✍️ Batch attestation demo →, or biometric matching📐🧬 Biometrics engine deep-dive →. H33 includes all three in 1.36ms.

Full Performance Data → Run Live Speed Test →

Every engine, every prover, every signature library — built from scratch. No wrappers. No forks. No external FHE or ZK dependencies📐⚙️ Proprietary engine deep-dive →.

Layer 0
H33-74
Universal Trust Primitive · 74 bytes
Layer 1 — Engines
Approximate arithmetic FHE
Intelligent engine routing
H33 TFHE
Boolean · Gate-level decisions
Algebraic intermediate representation
Encrypted match · Zero plaintext
H33-MPC
3
FHE Libraries

One Primitive. Dozens of Product Surfaces.

Every product below is built on the same 74-byte trust primitive.

Identity & Authentication

Passwordless, biometric📐🧬 Biometrics engine deep-dive →, continuous, and invisible authentication — all on encrypted data.

Full Stack Auth FHE Biometrics Continuous Auth Invisible Auth
1.36ms per auth📐📐 Full benchmark suite → · 99.2% attack detection📐🧬 Attack detection breakdown →
Learn more →
Encrypted Compute

Four FHE engines with intelligent routing. BFV adds and multiplies. TFHE decides. Compute on encrypted data without decryption.

FHE-IQ Routing TFHE Decisions CKKS FHE Encrypted Search
BFV + CKKS + BFV-32 + TFHE📐⚙️ Proprietary engine deep-dive → · <500ns routing · 768 TPS encrypted decisions
Learn more →
Verification & Attestation

ZK proofs, quantum-resistant signatures, and blockchain attestation for verifiable trust.

Zero-Knowledge Proofs Quantum Signatures Nested Hybrid Sigs Blockchain Attestation
2.0µs prove + 0.2µs verify📐🛡️ STARK lookup breakdown → · No trusted setup
Learn more →
Coordination & Agents

Multi-party computation, PQ video, AI attack detection, and agentic infrastructure.

H33-MPC PQ Video AI Attack Detection H33-Agent-74
N-of-M threshold📐🔑 Interactive Shamir demo → · 1.7ms per hop
Learn more →

Full API Service Grid

FHE + ZK + Dilithium in one call
Encrypted biometric match
FHE-IQ
Intelligent engine routing
Approximate arithmetic FHE
STARK Lookup + ZKP-AIR
3-key signatures (Ed25519 + PQ)
Blockchain
Bitcoin Taproot attestation
Invisible Auth
Zero-friction verification
Estate Fraud
Post-mortem identity attestation
KYC / AML
Zero-knowledge compliance
Continuous Auth
Ongoing session verification
PQ Video
Post-quantum video conferencing
Storage Encryption
At-rest + in-transit PQ encryption
AI Attack Detection
Adversarial input detection
Encrypted Search
Query encrypted data in place
H33-Agent-74
Agentic infrastructure attestation
Explore Full Product Suite →

Enterprise-grade. Formally verified.

9.9/10
Internal Security Assessment
Cryptographic parameter correctness, side-channel resistance, key management
7
Layers of Defense in Depth
Network, transport, application, cryptographic, biometric, attestation, audit
External Findings Resolved
Independent cryptographic review by Jose Contreras. 10 findings, 10 resolved, 0 open.
SOC 2 Type II HIPAA GDPR ISO 27001 PCI DSS FedRAMP (planned) FedNow (in progress)

PQ Compliance Shipping Now

NIST FIPS 203 (ML-KEM/Kyber) and FIPS 204 (ML-DSA/Dilithium) compliant today📐🔒 NIST security levels →. NIST FIPS 205 (SLH-DSA/SPHINCS+) compliant today. All three families active in production.

Constant-time implementations. No branching on secret data. Tested with ctgrind and timing analysis.

Security Demo → Testing & Review →

Trust, Review, and Deployment

Security

  • External crypto review
  • 10 findings / 10 resolved📐📐 See test breakdown by module →
  • Reproducible benchmarks📐📐 Full benchmark suite →
  • 7-layer defense in depth
View Findings →

Compliance

  • SOC 2 Type II — 100% Drata, audit closes June 3
  • ISO 27001 — 100% Drata, audit closes June 18
  • HIPAA BAA available
  • FedNow in progress
Trust Center →

Deployment

Documentation →

Intellectual Property

  • Patent Pending
  • #19/645,499
  • 300+ claims
  • 25+ application families
Whitepaper →

Quantum Migration Is Not Optional

Classical public-key systems are on a migration clock. H33 is built for the systems that have to survive that transition.

Harvest Now, Decrypt Later

Nation-states capture encrypted traffic today. When quantum computers arrive, they decrypt everything retroactively.

Every Classical Key Is Vulnerable

Shor's algorithm breaks RSA, ECDSA, and Diffie-Hellman. NIST finalized post-quantum standards in 2024.

Data Shelf Life

Quantum computers expected by 2028–2032. Data encrypted today has a 5–7 year shelf life. Federal deadline: 2030.

H33 = drop-in solution. No infrastructure rebuild.

See How H33 Solves This →

One API. Full Trust Pipeline.

Encrypt → verify → prove → attest

POST /v1/auth/verify
// Full pipeline: FHE encrypt → biometric match → ZK-STARK proof → Dilithium sign
Response: 1.36ms📐📐 Full benchmark suite → · Session token + H33-74 attestation
  • No infrastructure rebuild
  • One request for the full stack
  • Independent verification downstream

SDKs & Libraries

Rust API
Core library · Native performance
Rust FHE
Direct FHE engine access
Python
pip install h33
Node.js
npm install @h33/sdk
Go
go get h33.ai/sdk
React Native
Mobile-first PQ auth
Browse API Reference → Documentation →

Built for Regulated Industries

Banking

OCC/Fed compliance. Post-quantum key exchange. FedNow ready. Encrypted transaction processing.

Healthcare

HIPAA BAA available. Encrypted biometrics. PHI never decrypted on server. FHE clinical data matching.

Government

FedRAMP planned. NIST FIPS 203/204 compliant today. CMMC alignment. Zero-trust architecture.

Legal

Court-admissible evidence chains. Post-quantum signed attestations. Encrypted document management.

Insurance

Actuarial AI on encrypted data. Fraud detection with zero data exposure. PQ-attested claims processing.

Defense

CMMC compliance. Post-quantum video conferencing. Encrypted multi-party computation for classified workloads.

144 Patent Claims Pending · 8 Core Innovations📐⚙️ Proprietary engine deep-dive →

U.S. Patent Application #19/645,499. Filed April 14, 2026. Every innovation below is independently claimable.

Domain Separation Registry
Typed computation identifiers prevent cross-domain attestation reuse
First production bridge between homomorphic encryption and post-quantum signing
Fixed-Size Commitment
74-byte attestation regardless of computation complexity
Batch Merkle Attestation
Claims 124-125. Batched response attestation via Merkle tree
PQ Family Rotation
Attestations survive algorithm transitions without re-issuance
Full biometric lifecycle without plaintext exposure at any stage
Agent-74 Protocol
Cryptographic accountability for multi-agent AI pipelines
Bitcoin Anchor
Taproot P2TR + OP_RETURN without soft fork or new opcodes
Read Whitepaper → Patent Details →

Start Free. Scale Without Rebuilding.

Free
$0
1,000 auths / month
  • Full pipeline access
  • All SDKs
  • Community support
Get Started →
POPULAR
Starter
$0.03
per authentication
  • 10,000 auths / month
  • Priority support
  • Dashboard analytics
Start Trial →
BEST VALUE
Unlimited
$49,000
per year · unlimited attestations
  • Unlimited auths & attestations
  • Dedicated infrastructure
  • SLA & BAA
  • Priority engineering
  • Custom integration
Talk to Us →
See full pricing details →
FREE HICS

Get your free HICS code score.

H33 Independent Code Scoring. Five dimensions. STARK-proven. Dilithium-signed. One command. No account. No data leaves your machine.

brew install h33/tap/hics && hics scan .

What You Can Build

Six categories of applications that become possible when every computation is provable.

Verified AI Outputs

Prove what data an AI model received, what it computed, and what it returned. Court-admissible.

Private Computation

Run analytics, scoring, and matching on encrypted data. The server never sees plaintext.

Zero-Knowledge Compliance

Pass KYC, AML, and age verification without exposing personal data. Prove eligibility, not identity.

Permanent Audit Trails

Every decision anchored to Bitcoin. Tamper-evident. Independently verifiable decades later.

Multi-Agent Accountability

Every agent in a pipeline cryptographically signs its contribution. No more blame-shifting.

Quantum-Safe Infrastructure

Drop-in post-quantum protection. No key rotation crisis. No infrastructure rebuild.

Frequently Asked Questions

What is post-quantum cryptography?

Post-quantum cryptography (PQC) uses mathematical problems that quantum computers cannot solve efficiently — unlike RSA and ECC, which Shor's algorithm breaks. H33 implements NIST's finalized standards: ML-KEM (FIPS 203) for key encapsulation and ML-DSA (FIPS 204) for digital signatures. Every H33 API call is post-quantum end-to-end.

Is fully homomorphic encryption fast enough for production?

H33's BFV engine runs encrypted biometric matching at 35.25 microseconds per authentication📐📐 Full benchmark suite →2.21 million per second sustained on Graviton4📐📐 See how we measured this →. The optimization stack includes Montgomery NTT, Harvey lazy reduction, and NTT-domain fused inner products.

What is harvest now, decrypt later?

Adversaries are capturing encrypted data today to decrypt once quantum computers mature (estimated 2030-2035). If your authentication tokens or session keys use RSA or ECC, they're already at risk. H33's entire pipeline uses lattice-based cryptography that remains secure against quantum attacks.

How do I add post-quantum encryption to my app?

One API call. H33 handles FHE encryption, ZK-STARK proof generation, Dilithium signing, and biometric matching — all in 35.25 microseconds📐📐 Full benchmark suite →. Integrate via REST API, Python/Node/Rust/Go SDKs, or a single script tag for BotShield. Get 1,000 free credits →

How does encrypted biometric matching work?

H33 performs the entire biometric match in encrypted space using BFV fully homomorphic encryption. Biometric data is encrypted on-device, transmitted encrypted, compared encrypted, and never exists in plaintext on any server. The result is a ZK-STARK proof revealing only match or no match.

Is reCAPTCHA GDPR compliant?

As of April 2, 2026, Google shifts reCAPTCHA from data controller to data processor — meaning you bear legal responsibility for all data it collects. H33-BotShield uses SHA-256 proof-of-work instead: no cookies, no fingerprinting, no personal data. GDPR compliant by architecture.

What is a CAPTCHA alternative that doesn't track users?

BotShield by H33 replaces CAPTCHA with invisible proof-of-work. The visitor's browser solves a SHA-256 challenge in 1-3 seconds — no images, no checkboxes, no behavioral tracking. Free for 2,500 challenges per month.

What are NIST FIPS 203 and 204?

FIPS 203 (ML-KEM/Kyber) and FIPS 204 (ML-DSA/Dilithium)📐🔒 NIST security levels → are NIST's post-quantum cryptography standards, finalized August 2024. Federal agencies and their contractors must migrate by 2030. H33 is FIPS 203/204 compliant today.

View all FAQs →

Ship NIST-standard📐🔒 NIST security levels → post-quantum encryption this afternoon.

We solved the hard part. 1,000 free auths. Full API access. No credit card required.

FROM THE BLOG

Latest Technical Deep Dives

View All 370+ Articles →
Live Production Test
1,000 Real Auths. Your Browser. Right Now.
Every request hits our production pipeline: FHE biometric + ZK STARK (Cachee pre-cached) + Dilithium attestation on ARM Graviton. Full pipeline, real crypto.
H33-128 us-east-1 Detecting...
Run 1,000 live post-quantum auths
We’ll email you the full performance report
so you can share it with your team.
Free · No API key required · Results + report delivered to your inbox
P50
--
P95
--
P99
--
Avg
--
Latency Distribution (server-side compute)
Pipeline Breakdown (avg)
FHE Biometric--
ZK STARK Lookup--
Dilithium Attestation--
Total Server--
Network Context
Your Location--
Server Regionus-east-1
Network RTT--
Auths Completed--
Free Demo
Full post-quantum pipeline — FHE + ZKP + Dilithium, no shortcuts. SIMD batching packs 32 users into one ciphertext. 2,216,488 auth/sec sustained. 35.25µs per auth.
Get API Key →
Your full performance report has been sent to your email.
Share it with your team.
3 runs per hour · Different results every time
How you know this is real
🔄
Every hash is unique
Run it twice — every ciphertext, proof, and signature differs.
🌐
Real network request
Open DevTools → Network. You’ll see the POST and full JSON payload.
🔢
Nonce proves freshness
Each request has a unique nonce. The server signs it.
🖥
Production infrastructure
Real FHE, real ZKP, real Dilithium — not a simulation.