Benchmarks FHE APIs Pricing Token Docs Blog About
Log In Get API Key
🔐 Q-Dev: 372µs • Q-128: 1.04ms • Q-256: 2.22ms • 5-7x faster than SEAL 📜 15 Patent Claims Pending

1.04ms. Full post-quantum authentication.

"If You're Not Quantum Resistant in the Next Few Years, You're Out of Business" Why? →

SEAL: 5-7ms. H33 Q-128: 1.04ms. Same security. Ship today. What's NIST? →

Microsoft SEAL at N=2048? ~5-7ms per auth. H33 Q-128: 1.04ms. 5-7x faster. See the math →

Ship military-grade Quantum Resistant Encryption this afternoon.
FHE-encrypted biometrics. Zero-knowledge proofs. Quantum signatures. One API call.

372µs
Q-Dev (Dev)
1.04ms
Q-128 (128-bit)
2.22ms
Q-256 (256-bit)
5-7x
vs SEAL
NIST L1-L5
Compliant
Blink Test: 300ms blink ÷ 1.04ms = ~288 auths per blink. The only integrated PQC + FHE + Biometric provider.

Performance Modes v5.0

Mode Latency Security NIST Level
Q-Dev 372µs ~100-bit
Q-128 1.04ms 128-bit Level 1
Q-256 2.22ms 256-bit Level 5

Q-Dev (N=1024) for development only. Q-128 (N=2048) is NIST Level 1 compliant. Q-256 (N=4096) is NIST Level 5.

Q-Dev Mode Breakdown (372µs) — Dev Only

FHE Encrypt (BFV, N=1024) 251µs 67.5%
FHE Distance Compute 44µs 11.8%
FHE Decrypt 36µs 9.7%
PQC Overhead 40µs 10.8%
Cache Lookup ~1µs 0.2%
TOTAL 372µs 100%

Q-128 Mode Breakdown (1.04ms) — NIST Level 1

FHE Encrypt (512-D vector) 736µs 70.8%
FHE Homomorphic Distance 44µs 4.2%
FHE Decrypt 36µs 3.5%
PQC Layer (ML-KEM + ML-DSA) 150µs 14.4%
Serialization 75µs 7.2%
Cachee Lookup 2.09ns <0.1%
TOTAL 1.04ms 100%
ZK Verification Note
ZK Verify: 2.2ms (first) → 2.09ns (cached). 1,052,631× speedup via Cachee L1.
ZK Prove: KZG 108ms (96B) | IPA 170ms (944B) | FRI 30ms (47KB, post-quantum)
Blink = 300,000µs
Q-128: 300,000 ÷ 1,040 = ~288 auths per blink
Q-256: 300,000 ÷ 2,220 = 135 auths per blink
vs SEAL (same N=2048): 5-7ms → 1.04ms = 5-7× faster

Benchmarks: Apple M4 Max. AWS c7i.metal projections provided. Criterion.rs v0.5, 100+ samples. February 6, 2026 | v5.0

full-stack-auth.js
// Ship quantum-resistant auth this afternoon const result = await h33.auth.verify({ userId: 'user_123', biometric: faceData // Q-128 default: 1.04ms, 128-bit, NIST Level 1 }); // Maximum security? One parameter. const secure = await h33.auth.verify({ userId: 'user_123', biometric: faceData, mode: 'q-256' // 2.22ms, 256-bit, NIST Level 5 });
Performance

1.04ms. Full NIST Level 1 stack.

Benchmarked on AWS c7i.4xlarge (16 vCPU). Criterion.rs measurements. February 4, 2026 | v4.1

🔒
NIST Auth (Q-128)
1.04ms
PQC+FHE (NIST L1)
🧬
FHE Q-128
1.04ms
N=2048, NIST L1 128-bit
🔐
PQC Total
236µs
NIST Level 3
Q-Dev Mode
372µs
~100-bit (dev/testing)
🔐
+STARK (First Auth)
+~3.5ms
verify: ~21µs
🚀
vs Microsoft SEAL
5-7x
faster (verified)
1.04ms per NIST Level 1 authentication.
Includes: PQC (236µs) + FHE Q-128 (1.04ms) + Serialization (68µs) = 1.04ms. +STARK prove: ~3.5ms, verify: ~21µs.
5-7x
faster than SEAL
A human blink takes 300,000 microseconds.
In that time, H33 can complete 288 Q-128 auths (1.04ms), ~806 Q-Dev auths (372µs), or millions of cached verifications (2.09ns).
171x
NIST auth per blink
Speed Comparison

H33 vs Microsoft SEAL

Same security. Different speed. 5-7x faster on core FHE operations, 118x faster on compute-heavy operations.

Same Security, Different Speed

Operation SEAL BFV H33 Q-128 H33 Advantage
Encrypt 500-800 µs 506 µs Comparable
Square/Multiply 4,720 µs ~40 µs 118x faster
Relinearize 11,900 µs n/a (no relin) ∞ (skipped)
Full Auth Pipeline ~6,000 µs 866 µs 5-7x faster

Why the difference? SEAL is a general-purpose FHE library. H33 is purpose-built for authentication: shallow circuits, aggressive batching, no relinearization needed. Same BFV scheme, same security—just optimized for one use case.

Full Stack Auth Speed Comparison

Stack H33 Competitors (Combined) H33 Advantage
NIST Auth (PQC + FHE + Biometric) 1.04ms (Q-128 NIST L1) ~6,000ms (SEAL alone) 5-7x faster
FHE Only (Q-128, N=2048, 128-bit) 1.04ms ~6,000µs (SEAL) 5-7x faster
STARK Full Proof ~1.5ms ~20ms+ (build) ~13x faster

Individual Component Breakdown (v4.1)

Component H33 Alternative Notes
FHE Encrypt (Q-128 N=2048) 506µs SEAL: 500-800µs Comparable encryption speed
FHE Full Auth (Q-128) 1.04ms SEAL: ~6,000µs 5-7x faster. NIST Level 1 (128-bit).
FHE Full Auth (Q-256) 2.22ms SEAL: ~15-20ms 7-10x faster. NIST Level 5 (256-bit).
STARK Full Proof ~1.5ms RISC Zero: 2.5–15s Circle STARK / M31. ~100-bit soundness.
Kyber768 Full KEM 57.8µs liboqs: ~60µs Keygen 16.8µs + Encap 21.4µs + Decap 19.6µs
Dilithium3 Sign+Verify ~111µs liboqs: ~150µs Sign 78µs (worst) + Verify 32.6µs
Integrated Stack (NIST) 1.04ms ~6,000ms (SEAL FHE alone) 5-7x faster. Only integrated provider.

Measured on AWS c7i.4xlarge (16 vCPU). Criterion.rs v0.5, 100 samples per benchmark. February 2026.

Why H33

1.04ms. NIST Level 1. Complete stack.

The only production API combining FHE biometric matching (1.04ms Q-128) and NIST Level 1 post-quantum cryptography in a single 1.04ms call. +STARK prove: ~3.5ms, verify: ~21µs. 5-7x faster than Microsoft SEAL.

1.04ms
NIST Auth (Q-128)
1.04ms
FHE Q-128 (128-bit, L1)
~1.5ms
STARK Full Proof
5-7x
vs SEAL
Capability H33 (Feb 2026 v4.1) Industry Best H33 Advantage
Q-Dev Mode 372µs No comparison ~100-bit security (dev/testing)
Q-128 Mode (N=2048) 1.04ms SEAL: ~6,000µs 5-7x faster, NIST L1 128-bit
Merkle Verify (cached) 25.5µs ~100-500µs 4-20x faster
STARK Full Proof ~1.5ms ~20ms+ (build) ~13x faster
Full Auth (Q-128 NIST L1) 1.04ms ~6,000µs (SEAL alone) 5-7x faster
PQC Subtotal (NIST L3) 236µs liboqs: ~150µs Kyber768 + Dilithium3
Auths Per Blink 288x Q-128 / 806x Q-Dev N/A NIST Level 1 compliant
Throughput (per core) ~571/sec NIST No comparable offering Only full PQC auth stack
Cold Start (Full PQC) ~170µs N/A First authentication
PQC Overhead ~170µs N/A Kyber768 + Dilithium3 NIST Level 3
Cache Read Throughput 1.2M/sec ~100K/sec typical Cachee L1 cluster, 100% hit rate

c7i.4xlarge (16 vCPU) benchmarks: January 2026. c7i.48xlarge (192 vCPU) benchmarks: February 2, 2026. Full benchmark reports available.

Cryptographic Specifications

NIST Level 3 Post-Quantum Cryptography

Every authentication is protected by formally verified, standards-compliant cryptographic primitives.

🔐

FHE: BFV Scheme

Scheme: Brakerski/Fan-Vercauteren
Ring Dimension: N = 4,096 (Standard)
Coefficient Modulus: [54, 55] bits (109 bits total)
Plaintext Modulus: t = 65,537 (Fermat prime)
Security Level: 128-bit classical (NIST L1)
⚠️ Q-Dev (N=1,024): ~80-100 bit, NOT NIST-compliant. Dev/testing only.
🔑

Kyber768 (ML-KEM)

Standard: FIPS 203
Security Level: NIST Level 3 (AES-192)
Public Key: 1,184 bytes
Ciphertext: 1,088 bytes
Encap + Decap: 41µs
✍️

Dilithium3 (ML-DSA)

Standard: FIPS 204
Security Level: NIST Level 3 (AES-192)
Public Key: 1,952 bytes
Signature: 3,309 bytes
Sign + Verify: ~111µs

STARK: Circle STARK NEW

Field: Mersenne-31 (M31)
Hash: Poseidon2
Commitment: FRI
IVC: Nova accumulation
E2E Enrollment: 60µs

STARK Implementation NEW v4.0

Circle STARK over M31 (Mersenne-31). Poseidon2 hash, FRI commitment, Nova IVC. Optimized for biometric proofs.

591ps
M31 Add (~1.7B/sec)
640ps
M31 Mul (~1.5B/sec)
7.76µs
NTT 1,024
60µs
E2E Enrollment
1.58µs
Poseidon2 Hash/4
25.5µs
Merkle Verify
6.4µs
Nova IVC Accumulate
API Services

The full post-quantum stack. One API.

FHE biometrics, ZK proofs, quantum signatures, blockchain attestation. Everything you need for privacy-preserving authentication.

🧬
FHE Biometrics
Face, voice, fingerprint matching on encrypted data. Zero exposure. 1.04ms FHE full auth (Q-128). 5-7x faster than SEAL.
POST /biometric/enroll POST /biometric/verify POST /auth/incremental
NEW
🔢
CKKS FHE
Floating-point homomorphic encryption. Compute on encrypted real numbers. 128/192/256-bit security levels.
POST /fhe/ckks/keygen POST /fhe/ckks/encrypt POST /fhe/ckks/decrypt POST /fhe/ckks/add POST /fhe/ckks/multiply POST /fhe/ckks/rescale
NEW
🔣
TFHE
Boolean/integer homomorphic encryption. Encrypted logic gates and comparisons. Ultra-fast bootstrapping.
POST /fhe/tfhe/keygen POST /fhe/tfhe/encrypt/bool POST /fhe/tfhe/encrypt/int POST /fhe/tfhe/decrypt/bool POST /fhe/tfhe/decrypt/int POST /fhe/tfhe/and POST /fhe/tfhe/or POST /fhe/tfhe/xor POST /fhe/tfhe/not POST /fhe/tfhe/compare
🔒
Zero-Knowledge Proofs
Prove identity, age, location without revealing data. Custom circuits supported.
POST /zkp/prove POST /zkp/verify
🔐
Quantum Signatures
CRYSTALS-Dilithium & Kyber. NIST FIPS 203/204 compliant. 82µs sign+verify. 104x pool speedup.
POST /quantum/sign POST /quantum/verify
⛓️
Blockchain Attestation
Solana soulbound NFTs. Immutable audit trails. ZK-compressed logging (5000x less expensive).
POST /blockchain/attest POST /blockchain/mint-sbt
NEW
👻
Invisible Auth
Zero-transmission authentication. No codes displayed. Hardware-secured invisible keys.
POST /auth/invisible POST /auth/session
PATENT
🛡️
Estate Fraud Detection
Behavioral shift detection from deceased baselines. Beneficiary collusion detection. Court-admissible evidence.
POST /fraud/estate/analyze GET /fraud/evidence
🏛️
KYC / AML
Privacy-preserving identity verification. ZK proofs of eligibility without exposing documents.
POST /kyc/verify POST /aml/screen
🧠
Continuous Auth
Multi-modal fusion: keystroke, mouse, face, voice. LSTM behavioral modeling. 99.2% attack detection.
WS /auth/continuous POST /auth/behavioral
📜 15 Patent Claims Pending

7 Core Innovations

Protected intellectual property covering the complete post-quantum authentication stack.

1
Homomorphic Biometric Matching
Euclidean distance on encrypted templates. Zero data exposure. BFV scheme with SIMD batching.
2
Zero-Knowledge Identity Proofs
Custom R1CS circuits for age, location, credential verification. 40% constraint reduction.
3
Continuous Multi-Modal Fusion
LSTM temporal modeling. Keystroke, mouse, face, voice, physiological signals. 94.7% accuracy.
4
Quantum-Resistant Architecture
Kyber, Dilithium, FALCON with automated migration. 30+ year quantum resistance.
5
Estate Fraud Detection
Behavioral shift analysis from deceased baselines. Collusion detection. Legal evidence generation.
6
ML Threat Attribution
Ensemble classification for attack source identification. Campaign tracking. 89-95% accuracy.
7
Blockchain Compliance
Smart contracts for GDPR/HIPAA. ZK-compressed logging. 5000x cost reduction.
+
Invisible Authentication
Zero-transmission auth. Hardware-secured keys. Zero-knowledge registration.
✓ Self-serve • No sales calls • Credits never expire

Simple credit-based pricing

Buy credits, use them for any operation. 20% off annual prepay. Overage at 2x pack rate.

Starter
$349
5,000 credits
$0.070/credit
All APIs
Q-Dev mode (372µs) ⚠️
10 req/sec
Webhooks
Pro
$2,499
50,000 credits
$0.050/credit
200 req/sec
99.9% SLA
20 API keys
12hr support
Business
$6,999
150,000 credits
$0.047/credit
500 req/sec
SOC 2 report
Unlimited API keys
4hr support
Scale
$17,999
400,000 credits
$0.045/credit
Enterprise
$49,999
1,250,000 credits
$0.040/credit • Dedicated AM
Trial
Free
500 credits • 60 days
50 credits/day limit

Operation Credit Costs

Q-Dev = dev/testing • Q-128 = NIST L1 (default) • Q-256 = NIST L5
Operation Q-Dev (372µs) ⚠️ Q-128 (1.04ms) Q-256 (2.22ms)
Biometric Verify 3 1.5 2
Biometric Enroll 5 3 4
FHE Encrypt/Decrypt 3 1.5 2
ZK Proof Generate 8 5 6
ZK Proof Verify 2 1 1.5
Blockchain Tx (Solana) 1 1 1
Quantum Sign/Verify 3 2 2
🎯 Full Stack Auth 15 8 12

KYC / Identity (Fixed Pricing)

$49
KYC Basic + SBT
ID, Selfie, Liveness, Soulbound NFT mint
$79
KYC Enhanced + SBT
+ Proof of Address verification
$19
AML/PEP Screening
Sanctions, PEP, Adverse Media
$99
Full Bundle
KYC + AML + Soulbound NFT

All KYC includes: FHE-encrypted biometrics, ZK proof, quantum signatures, Solana soulbound NFT.

Security

Enterprise-grade. Formally verified.

Post-quantum cryptography, 16 mathematical proofs, 7 defense layers. Security that doesn't slow you down.

9.9/10
Enterprise Security Rating
View Testing Methodology →
0
Critical Vulns
16
Kani Proofs
7
Defense Layers
99.2%
Attack Detection

7-Layer Defense in Depth

Layer 7: Post-Quantum Cryptography Dilithium3 + Kyber768 • NIST Level 3
Layer 6: Zero-Knowledge Proofs Groth16 • Privacy without exposure
Layer 5: Homomorphic Encryption BFV/CKKS • Compute on encrypted data
Layer 4: Hardware Security (TEE) Intel SGX • Fortanix EDP
Layer 3: Formal Verification 16 Kani Proofs • Mathematical guarantees
Layer 2: Network Security WAF • DDoS • mTLS • Segmentation
Layer 1: Infrastructure AWS • VPC • IAM • CloudTrail

Compliance Ready

🏥
HIPAA
🇪🇺
GDPR
📊
SOC 2
💳
PCI DSS
🔒
ISO 27001
🏛️
FedRAMP
Benchmarks

Real-world performance. Independently verifiable.

All benchmarks on AWS c7i.48xlarge (192 vCPU Xeon 8488C, 384GB RAM) + ElastiCache r6g.xlarge. February 2, 2026 results. Reproducible with our open-source test suite.

Instance
c7i.48xlarge
192 vCPU • 384GB • AVX2
Batch Auth
52.2M/sec
5M users per second peak
Proof Cache
67x faster
32µs vs 2.14ms

NEW: Advanced Optimizations

OperationLatencyImprovement
Session Resume50µsNEW
Delta Auth (5%)<50µs4.4x faster
Proof Verify (cached)32µs67x faster
Batch ZKP (100)35ms73% faster

Quantum-Resistant Full Stack Benchmarks v4.0

FHE (BFV) + STARK + Biometrics + Kyber768 + Dilithium3
InstanceRequest TypeLatencyThroughput
c7i.4xlarge (16 vCPU)Single (cold)~630µs1,587/sec
c7i.4xlarge (16 vCPU)Session~500µs2,000/sec
c7i.48xlarge (192 vCPU)Session PQC70µs~2.3M/sec
PQC Operations: Kyber768 57.8µs • Dilithium3 ~85µs • Total PQC overhead: ~170µs
Memory Pooling: 28% FHE latency reduction (317µs encrypt, was 435µs) • STARK: 60µs E2E (83x improvement)

Batch Authentication Scaling

UsersTotal TimePer User
10757µs75µs
10056µs<1µs
50094µs<1µs
1,000116µs<1µs

FHE Authentication v4.1

OperationLatencyThroughput
FHE Full Auth (Q-Dev)372µs2,688 ops/sec
FHE Encrypt (Q-128, 512-D)736µs
FHE Full Auth (Q-128)1.04ms1,155 ops/sec
FHE Full Auth (Q-256)2.22ms476 ops/sec

Quantum Signatures (Dilithium3 - NIST Level 3)

OperationLatency
Key Generation36.6µs
Sign45µs
Verify36.9µs
Pool Keygen0.35µs (104x)
Documentation

API Reference

Complete API documentation for H33's post-quantum authentication platform. Base URL: https://api.h33.ai/v1

Authentication Full Stack Auth Biometrics FHE Zero-Knowledge Quantum Signatures Blockchain KYC/AML Errors

Authentication

All API requests require authentication using your API key in the Authorization header.

HTTP Header
Authorization: Bearer h33_live_xxxxxxxxxxxxxxxxxxxx
ℹ️
API Key Types
h33_live_* - Production keys, full access
h33_test_* - Test keys, sandbox environment (no credits consumed)

Full Stack Auth PATENT PENDING

One API call: biometric + FHE + ZK proof + quantum signature + blockchain attestation.

Biometric APIs

FHE-encrypted biometric enrollment and verification. We never see or store raw biometric data.

POST /biometric/enroll

Enroll a new biometric template (face, voice, fingerprint). Encrypted with FHE before storage.

5 credits
Q-Dev
3 credits
Q-128
POST /biometric/verify POPULAR

Verify biometric against enrolled template. Matching performed entirely on encrypted data.

1.04ms
Latency (Q-128)
1.5 credits
Q-128

FHE Encryption

Fully Homomorphic Encryption - compute on encrypted data without decrypting.

Mode Latency NIST Level Use Case
Q-Dev 372µs Below L1 (~100-bit) ⚠️ Dev/testing only
Q-128 1.04ms Level 1 (128-bit) Production default
Q-256 2.22ms Level 5 (256-bit) Maximum security
POST /fhe/encrypt

Encrypt data using FHE. Supports BFV (integers) and CKKS (floating point) schemes.

150µs
Latency
3 credits
Q-Dev
POST /fhe/compute

Perform operations on encrypted data: addition, multiplication, comparison, Euclidean distance.

125µs
FHE Match

Zero-Knowledge Proofs

Prove statements without revealing underlying data. Supports Groth16, PLONK, and STARK.

Scheme Proof Size Verify Time Notes
KZG (Groth16) ~200 bytes ~3ms Smallest proofs, trusted setup
IPA (PLONK) ~1KB ~10ms No trusted setup
FRI (H33 STARK) ~14KB ~21µs verify Post-quantum safe, Circle STARK
POST /zkp/prove

Generate a ZK proof. Prove age, location, credentials without revealing data.

32µs
Cached
8 credits
Q-Dev
POST /zkp/verify

Verify a ZK proof. Returns true if proof is valid for given public inputs.

3.83ms
Groth16
5ms
H33 STARK

Quantum Signatures

NIST FIPS 203/204 compliant post-quantum digital signatures. ML-KEM 33.3µs keygen, Dilithium 45µs sign.

🔐
Algorithms Supported
CRYSTALS-Dilithium - Primary (FIPS 204) • CRYSTALS-Kyber - Key encapsulation (FIPS 203) • FALCON - Compact signatures
POST /quantum/sign

Sign data using Dilithium3 (NIST Level 3) quantum-resistant algorithm.

45µs
Sign
3 credits
Q-Dev
POST /quantum/verify

Verify a quantum-resistant signature.

36.9µs
Verify
88µs
Full Cycle

Blockchain Attestation

Immutable records on Solana. ZK-compressed logging (5000x less expensive than raw transactions).

POST /blockchain/attest

Create immutable attestation record. Perfect for audit trails and compliance.

~400ms
Confirmation
1 credit
Cost
POST /blockchain/mint-sbt

Mint a Soulbound Token (non-transferable NFT) for verified identity credentials.

Solana
Network

KYC / AML

Privacy-preserving identity verification with Soulbound NFT issuance.

Package Price Includes
KYC Basic + SBT $49 ID + Selfie + Liveness + Soulbound NFT
KYC Enhanced + SBT $79 Basic + Proof of Address
AML/PEP Screening $19 Sanctions, PEP, Adverse Media
Full Bundle $99 KYC + AML + Soulbound NFT
POST /kyc/verify
JavaScript
const kyc = await h33.kyc.verify({ userId: 'user_123', package: 'full_bundle', // $99 documents: { idFront: idBase64, selfie: selfieBase64 }, walletAddress: 'Gh9ZwE...' // For SBT mint }); // { status: "verified", amlClear: true, zkProof: "0x...", sbtMint: "H33sbt..." }

Error Codes

All API errors return a consistent JSON structure.

Error Response
{ "error": { "code": "INSUFFICIENT_CREDITS", "message": "Account has 12 credits, operation requires 15" } }
Code HTTP Description
INVALID_API_KEY 401 API key is missing, invalid, or revoked
INSUFFICIENT_CREDITS 402 Not enough credits for the operation
RATE_LIMITED 429 Too many requests, slow down
USER_NOT_ENROLLED 404 No biometric template found for user
PROOF_INVALID 400 ZK proof verification failed

Rate Limits

Tier Requests/sec Requests/day
Trial 10 1,000
Starter 50 50,000
Growth 100 100,000
Business+ 500+ Unlimited
SDKs

Native SDKs for every stack

Official client libraries with TypeScript definitions, async/await support, and automatic retries.

Node.js / TypeScript
npm install @h33/client
Python
pip install h33
Go
go get github.com/h33-ai/h33-go
Rust
cargo add h33
React Native
npm install @h33/react-native

Ship military-grade post-quantum encryption this afternoon.

We solved the hard part. 500 free credits. Full API access. No credit card required.

Get Free API Key → Talk to Sales

Why Quantum Computing Changes Everything

Your current encryption (RSA-2048, ECDSA):

Classical Computer
300 trillion years to break
Quantum (4,000 qubits)
~10 seconds

Shor's algorithm breaks every RSA key, every ECDSA signature, every TLS handshake.

"Harvest Now, Decrypt Later"

Nation-states are recording encrypted traffic TODAY. When quantum arrives, they decrypt everything retroactively.

  • Your 2024 trade secrets
  • Your 2025 M&A communications
  • All exposed.

Timeline

2024: NIST finalizes post-quantum standards ✓
2025-2026: Federal transition mandates begin
2028-2032: Cryptographically relevant quantum expected
2030+: Everything encrypted before transition = compromised

NIST Post-Quantum Cryptography Standards

NIST (National Institute of Standards and Technology) sets cryptographic standards for U.S. government and enterprise.

August 2024 Standards:

FIPS 203ML-KEM (Kyber)Key Exchange
FIPS 204ML-DSA (Dilithium)Signatures
FIPS 202SHA-3Hash Functions

128-bit minimum required for compliance.

Many vendors use ~100-bit for speed. They'll fail your audit.

H33 Default:

128-bit, NIST Level 1, FIPS 203/204 ✓

H33 Q-Dev (opt-in):

~100-bit, 372µs, for ephemeral/gaming/dev

The Math Behind H33

REPEAT AUTH (99% of traffic): 1.04ms (Q-128)

ComponentTime%
ML-KEM (Encap + Decap)41µs4%
ML-DSA (4 ops)195µs17%
FHE Encrypt (Q-128 N=2048)506µs43%
FHE Compute~40µs3%
FHE Decrypt320µs27%
Serialization68µs6%
Cachee Lookup2ns~0%
TOTAL1.04ms100%

FIRST AUTH: +~3.5ms (STARK prove once, verify ~21µs)

⚡ vs SEAL (same security)

OperationH33 Q-128SEALAdvantage
Encrypt506µs500-800µsComparable
Square/Multiply~40µs4,720µs118x
Full Auth1.04ms~6,000µs5-7x

🔧 vs DIY Cobbled Stack

H33DIYAdvantage
Repeat Auth1.04ms200-900ms170-770x
First Auth~2.67ms1.4-4.2s520-1,570x
Vendors14-6
Integration1 afternoon6-12 months

📈 Blink Test

300ms blink ÷ 1.04ms = 256 auths per blink (Q-128)
Source: Criterion.rs v0.5, AWS c7i.4xlarge, February 4, 2026 | v4.1
Full Benchmark Report →