Hi, I'm Maaike van Leuken.

I'm a self-employed cryptographer and entrepreneur specialised in post-quantum cryptography. Interested in making your organisation more quantum-safe or getting more insight into your cryptographic assets? Check out the rest of the website or contact me.

About memy stats

Information About me

I'm a pro-active and ambitions person, curious and eager to learn anything. Ex-colleagues describe me as a jack of all trades, nice to work with and pragmatic.

BSc.

Computing Science
Radboud University

MSc.

Cyber Security
Radboud University

15+

Projects
Completed

10

Years Active
In Cryptography

My Skills

Python

85%

Latex

90%

HTML + CSS

60%

C(++)

70%

java

40%

vdhl

50%

haskell

40%

English

95%

Dutch

100%

Spanish

15%

My Timeline

2026-PRESENT

Self-Employed Cryptographer - MvL Technologies

Helping organisations in their migration towards quantum-safe cryptography, through the offering of consultancy and self-developed tooling.

2021-2025

Scientist Integrator and Portfolio Manager - TNO

Worked in the Unit ICT, Strategy & Policy, in the department Applied Cryptography and Quantum Algorithms. As a scientist integrator, I took on various activities that typically belong to the role of consultant, project lead and scientist, such that I was involved in translating the client's problem to a solution, working out requirements and an architecture for that solution and implementing it. As portfolio manager of Quantum Safe Technologies, I was responsible for the development and execution of the roadmap, strategy and vision for this topic. This included bringing experts, consultants, business developers and (higher) management together and agreeing on a systematic approach.

I also coordinated the internships within our department and set up collaborations with other departments within TNO.

I co-organised the PQC Symposium 2024 and published an article in 2024 IEEE International Conference on Big Data.

2019-2021

MSc. Cyber Security - Radboud University

My main focus was on cryptography. During my research internship under supervision of Dr. S. Samardjiska, I added rank-based cryptography to the SageMath toolbox. I conducted my thesis under supervision of Prof. J. Daemen, "runaway generators and their security and efficiency".

2016 - 2019

BSc. Computer Science - Radboud University

Followed the Cyber Security track. Conducted my thesis under supervision of Prof. L. Batina, "Comparing Correlation Coefficient and Difference of Means in a Differential Power Analysis Attack".

2015-2017

Propedeuse Physics - Radboud University

Completed courses on linear algebra, calculus, classical mechanics and thermodynamics.

Quantum SafetySecurity

Fixing your Cryptography

Compliancy

To EU/Dutch Legislation
and Industry Standards

Crypto-Agility

To swiftly and efficiently
upgrade cryptography

PQC Migration

Protecting assets against
the quantum threat

Through Independent Advice, Research and Tooling

Cryptographic Governance & Compliance

Organisations increasingly need to demonstrate cryptographic control to regulators, auditors, and customers. I assist with defining policies, governance structures, and technical controls aligned with frameworks such as post-quantum migration guidance, industry standards, and security best practices. This ensures that cryptography is not only implemented correctly, but also managed as a strategic security capability.

Cryptographic Agility

Future-proof systems must be able to evolve cryptography without requiring large-scale redesigns. This aids in protecting against any cryptographic weaknesses, including quantum vulnerabilies. I help design architectures and processes that allow cryptographic algorithms, key sizes, and trust anchors to be updated safely and efficiently. This includes abstraction patterns, key lifecycle management strategies, and governance models that enable rapid response to emerging vulnerabilities or regulatory requirements.

Post-Quantum Cryptographic Migration

Many systems still rely on legacy or soon-to-be-deprecated algorithms. I support organisations in designing and executing structured migration strategies toward modern and quantum-resistant cryptography. This includes prioritising high-risk assets, assessing migration effort, designing transition architectures, and minimising operational disruption during the transition.

Identifying Cryptographic Assets

Through the omni-presence of cryptography, it is easy to lose track of where cryptography is used across systems. I help identify cryptographic assets through providing my own tooling, or advising on which other tooling to use. The result is a structured inventory of cryptographic dependencies connected to business processes, that forms the foundation for risk assessment, governance, and migration planning.

Assessing Migration Effort

Once cryptographic assets are identified, the next step is understanding where to migrate to and how difficult this migration is. I assess the technical and operational complexity of cryptographic migration across systems, including software dependencies, hardware constraints, protocol compatibility, and key management processes. This allows organisations to prioritise migrations based on risk, effort, and business impact.

Migration Planning

Effective cryptographic migration requires careful planning to avoid operational risk and ensure continuity. I design structured migration strategies that define timelines, architectural changes, and transition mechanisms such as hybrid cryptography or phased deployments. The goal is to enable a controlled transition toward modern and post-quantum cryptographic standards while maintaining security and business continuity.

My PortfolioMy Work

Here is some of my publicly available work.

Co-author "Crypto Asset Discovery and Inventory" Report

PCSI - Software PQC Migration

PQChoiceAssistant (as Project Lead)

Co-Author and Presenter at IEEE Big Data

Co-organiser and Presenter at PQC Symposium 2024

Credential Comparison Matrix

QDX for ZINL

Digital Identity Wallet Overview

Standardisation Overview

Runaway Keystream Generators

SageMath Toolbox for PQC

Differential Power Analysis on AES

My ThoughtsMy Blogs

Cyberaanval voorkomen? Formele hardware verificatie cruciaal

1 oktober 2024

Een zelfrijdende auto die op afstand bestuurd wordt door een aanvaller. Gamecontrollers waarmee je het betalen van spelletjes kunt omzeilen. Of mensen die machines van grote techbedrijven namaken. Allemaal voorbeelden waarbij de hardware niet veilig genoeg in elkaar zat, waardoor mensen er misbruik van maakten. Om dit soort fouten te voorkomen, moeten we de cryptografie in hardware controleren en beveiligen. En het liefst al vóórdat het gemaakt is. Dat is waar TNO aan werkt.

TNO’s view of 2030: Digital privacy and security for everyone

21 April 2023

Privacy and cyber security are the cornerstones of our digital society. ‘Digital privacy and security for everyone’ is therefore one of TNO’s ambitious goals. In 10 years, we’ll ensure that everyone can exchange data online with complete peace of mind. Together with our partners, we are making this possible with smart innovations in data encryption, quantum-safe data sharing, and secure digital infrastructure.

Small cut-out of the interactive overview

What are those SSI standards?

9 May 2023

It can be difficult for SSI adopters to figure out which standards in the context of SSI are relevant and how they relate to other standards. Our standardisation overview helps with this, by giving insight in the positioning of standards in the context of SSI.

Solving the effort of offering support for a great variety of wallets

25 November 2022

Due to competing technological approaches, there is fragmentation within the SSI ecosystem. Read our solution to this problem: TNO EASSI.