Developer Resources
Documentation
Everything you need to integrate quantum-secure encryption into your applications. SDKs for Python, Rust, and Node.js with full API reference.
Full Documentation
9 parts, 60+ pages, interactive Jupyter notebooks, autodoc API reference, Rust docs
Releases, Research & IP
April 2026 shipping state. Click through to the JupyterBook for full technical detail.
Releases
SDK v0.5.0, Flutter Build 43, signaling server, Mesh Wave 1. All April 2026 shipping cadence in one place.
Read moreResearch Papers
Three papers covering certified anonymisation, CSI entropy, and heterogeneous entropy. Targets: PoPETs 2027, CCS 2026.
Read morePatent Portfolio
Three patents filed at Patentstyret, 46 claims total. Quantum OTP, CSI entropy, heterogeneous mixing.
Read moreQ-Mesh Wave 1
Six physical-crypto modules: CSI entropy, PUEK, EM canary, vital-auth, topo-auth, spatiotemporal non-repudiation.
Read moreQuick Start
From zero to quantum-secure in four steps.
Install
pip install zipminatorGenerate Keys
from zipminator import keypair
pk, sk = keypair()Encrypt
from zipminator import encapsulate
ct, shared_secret = encapsulate(pk)Deploy
docker run -p 8000:8000 qdaria/zipminator-apiDocumentation
Getting Started
Installation, first key generation, and basic encryption in under 5 minutes.
Read moreAPI Reference
Full SDK documentation for Python, Rust, and Node.js bindings.
Read moreCLI Reference
Command-line tool for key management, encryption, and PII scanning.
Read more10-Level Anonymization
From basic redaction to quantum-secure k-anonymity with differential privacy.
Read moreCompliance & Standards
NIST FIPS 203 (ML-KEM-768), NIST Security Level 3, KAT vector verification.
Read moreJupyterLab Integration
Magic commands, interactive widgets, and quantum entropy visualization.
Read more10-Level Anonymization
Progressive anonymisation from regex masking to Quantum OTP. All 10 levels are production-verified (64 unit tests, 45 integration tests).
Jupyter Notebooks
Interactive tutorials with live quantum entropy visualization.
Quickstart
First encryption in 3 cells. Key generation, encapsulation, and decapsulation.
Anonymization
All 10 anonymization levels demonstrated on sample data with code examples.
QRNG Entropy
Quantum random number generation, pool health, and distribution analysis.
Compliance
PII scanning, GDPR-aligned anonymization, and audit trail generation.
Shor's Algorithm
Demonstrates why RSA is vulnerable and why lattice-based PQC is needed.
Quantum Capabilities
Real quantum entropy harvesting from IBM 156-qubit hardware.
Data Vault Workflow
Full lifecycle: PII scan, anonymize, encrypt with password or PQC, reopen, self-destruct.
SDK Reference
Native bindings for every major language. Same Kyber768 core, zero compromise.
from zipminator import keypair, encapsulate, decapsulate
# Generate ML-KEM-768 keypair
pk, sk = keypair()
# Sender: encapsulate shared secret
ciphertext, shared_secret = encapsulate(pk)
# Receiver: decapsulate to recover shared secret
recovered = decapsulate(ciphertext, sk)
assert shared_secret == recoveredREST API
Production-ready endpoints with rate limiting, auth, and OpenAPI spec.
/v1/keys/generate/v1/encrypt/v1/decrypt/v1/pii/scan/v1/files/encrypt/v1/entropy/statusCompliance & Standards
NIST FIPS 203
Implements ML-KEM-768 (Kyber768) as specified in the NIST post-quantum standard.
NIST Level 3 Security
Equivalent to AES-192 classical security. Resistant to both classical and quantum attacks.
KAT Verified
All Known Answer Test vectors pass. Constant-time implementation with no timing side-channels.
Enterprise & On-Premise
Deploy Zipminator in air-gapped environments, private clouds, or on-premise infrastructure. Includes dedicated support, SLA guarantees, custom integration, and hardware security module (HSM) support.