BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Available on AWS

Add post-quantum encryption to any AWS application. No rebuilds.

CloudFormation one-click deploy. AWS Marketplace billing. Lambda Layer for serverless. PrivateLink for enterprise. Every path gets you the same H33 cryptography — FHE, Dilithium, ZK-STARK — running in under 5 minutes.

Four ways to deploy. Same cryptography.

Pick the integration that matches how you build. CloudFormation for infrastructure-as-code teams. Marketplace for procurement simplicity. Lambda Layer for serverless. PrivateLink for zero-trust networks.

~3 minutes
Option 1

CloudFormation (One-Click)

Deploy an API Gateway + Lambda proxy that wraps any API call with H33's post-quantum pipeline. Your existing application code doesn't change. The proxy adds FHE encryption, 3-key PQ signatures, and ZK-STARK proofs to every request.

What you get
API Gateway endpoint Lambda function CloudWatch logging
Launch Stack
Instant
Option 2

AWS Marketplace

Subscribe to H33 through AWS Marketplace. Billing goes through your existing AWS account — no new vendor approval, no procurement process. Usage-based pricing: pay per operation through AWS metering.

What you get
AWS billing integration SaaS subscription Usage metering
View on Marketplace
~2 minutes
Option 3

Lambda Layer

Add the H33 Lambda Layer to any function. Import h33, call h33.encrypt(), h33.sign(), h33.verify(). The layer handles authentication, connection pooling, retries, and circuit breaking. Works with Node.js 18/20 and Python 3.11/3.12.

const h33 = require('h33-pq');

// One line — PQ-sign any data
const sig = await h33.sign(event.body);

// One line — FHE encrypt sensitive fields
const encrypted = await h33.encrypt([ssn, dob, salary]);
LAYER ARN (us-east-1)
arn:aws:lambda:us-east-1:329646112703:layer:h33-pq:1
View Docs
~1 hour (with H33 support)
Option 4

PrivateLink

Enterprise-grade private connectivity. H33 traffic stays on the AWS backbone — never traverses the public internet. Deploy an interface VPC endpoint in your VPC and all H33 API calls route through AWS's private network.

What you get
VPC endpoint Private DNS No internet exposure
Contact for PrivateLink

Before and after H33

Your architecture stays the same. The security guarantee changes completely.

Before
Your API call
AWS KMS (classical encryption)
Your database
H33 Proxy
After
Your API call
H33 Proxy
FHE + Dilithium + ZK-STARK
Your database (post-quantum)

Your first post-quantum API call

After the CloudFormation stack deploys, your endpoint is ready. One curl command to verify.

terminal
# After CloudFormation deploy, your endpoint is ready:
curl -X POST https://YOUR-API-ID.execute-api.us-east-1.amazonaws.com/h33/attest \
  -H "Content-Type: application/json" \
  -d '{"data": "sensitive-payload", "sensitive_fields": [42, 100]}'
35.25us
Per operation
2.21M
Operations / second
FIPS 203/204
NIST compliant
0
Code changes required

Start protecting your AWS workloads today

Get a free API key with 1,000 operations per month. Launch a CloudFormation stack in 3 minutes. No credit card required to start.

Verify It Yourself