Xored Services logo XoredInnovations

Applied cryptography for high-trust systems

Security is a process, not a product.

Xored Innovations helps organizations design and assess cryptographic systems, e-voting platforms, and smart contract deployments with a focus on verifiability, threat realism, and operational clarity.

Services

Privacy-preserving applied cryptography

Protocol design, architecture review, and implementation guidance for systems that need confidentiality without sacrificing proof, accountability, or performance.

E-voting systems design

End-to-end support for voting workflows, verifiability models, ballot secrecy, adversarial analysis, and system-level trust assumptions.

Smart contract code audit

Review support for protocol logic, privileged operations, upgrade paths, and failure scenarios before they become irreversible on-chain.

Formal verification

Specification-oriented review and verification planning for critical components where mathematical assurance is needed beyond testing and conventional code inspection.

Selected domains

Confidential computation Zero-knowledge adjacent architectures Election integrity workflows Protocol review and assurance Formal verification Secure governance mechanisms

Recent clients

Post Quantum Cryptographer

PostQuant

Worked on post-quantum cryptography research and applied security direction for next-generation networked systems, with emphasis on future-resilient design and practical deployment constraints.

Blockchain research and zero-knowledge PoC

Parfin

Delivered blockchain research including a thorough study of SNARK variants, then designed and implemented proof-of-concept work for atomic swaps and zero-knowledge circuits.

E-voting research and zk circuit design

Votexx

Conducted research across the e-voting literature and designed a zero-knowledge circuit for privacy-preserving voting, with attention to ballot secrecy, verifiability, and practical system assumptions.

Approach

The work is structured around concrete risks: what must remain secret, what must be independently verifiable, what can fail, and who can exploit that failure. That keeps design decisions tied to operational reality instead of academic abstraction.

Deliverables can include design notes, audit observations, attack surface mapping, implementation guidance, and stakeholder-ready summaries for technical and executive audiences.

01

Threat-model first

Security claims are only meaningful when attacker capabilities and trust boundaries are explicit.

02

Verifiability matters

Critical systems need defensible evidence, not informal confidence.

03

Operationally grounded

Design recommendations are shaped by deployment constraints, governance, and maintenance realities.

Contact

contact@xored.io

Montreal, Canada

Independent consultancy in cryptography, voting systems, and blockchain security.