# MPC-HSM Hybrid ⎊ Term

**Published:** 2026-03-11
**Author:** Greeks.live
**Categories:** Term

---

![A close-up view presents a modern, abstract object composed of layered, rounded forms with a dark blue outer ring and a bright green core. The design features precise, high-tech components in shades of blue and green, suggesting a complex mechanical or digital structure](https://term.greeks.live/wp-content/uploads/2025/12/a-detailed-conceptual-model-of-layered-defi-derivatives-protocol-architecture-for-advanced-risk-tranching.webp)

![A detailed abstract digital rendering features interwoven, rounded bands in colors including dark navy blue, bright teal, cream, and vibrant green against a dark background. The bands intertwine and overlap in a complex, flowing knot-like pattern](https://term.greeks.live/wp-content/uploads/2025/12/interwoven-multi-asset-collateralization-and-complex-derivative-structures-in-defi-markets.webp)

## Essence

**MPC-HSM Hybrid** architecture represents the convergence of distributed cryptographic computation and hardened physical [security modules](https://term.greeks.live/area/security-modules/) to manage [digital asset](https://term.greeks.live/area/digital-asset/) keys. This framework decentralizes the signing process while maintaining the integrity of hardware-backed root secrets, effectively addressing the vulnerability of centralized custodial systems. By splitting private keys into mathematical shares across disparate nodes, the system ensures no single entity holds a complete secret.

The integration of **Hardware Security Modules** at each node adds a layer of tamper-resistant execution, enforcing strict policy controls and identity verification before any partial signature generation occurs.

> MPC-HSM Hybrid architecture synthesizes decentralized cryptographic key management with hardware-enforced policy execution to eliminate single points of failure in digital asset custody.

The operational utility of this structure lies in its ability to facilitate institutional-grade transaction throughput without compromising on security. It transforms the signing event from a monolithic operation into a coordinated, multi-party consensus process, where each participant relies on their internal **HSM** to validate the legitimacy of the request.

![A dark blue and layered abstract shape unfolds, revealing nested inner layers in lighter blue, bright green, and beige. The composition suggests a complex, dynamic structure or form](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-structured-products-risk-stratification-and-decentralized-finance-protocol-layers.webp)

## Origin

The genesis of this model stems from the inherent tension between the transparency of blockchain protocols and the opacity required for secure institutional capital management. Early attempts at securing digital assets relied heavily on cold storage, which offered security but introduced significant friction for liquidity management and high-frequency trading.

The evolution toward **Multi-Party Computation** emerged as a solution to remove the need for a single, centralized authority. However, purely software-based **MPC** implementations often faced scrutiny regarding their vulnerability to malware or unauthorized code execution within the server environment. The subsequent introduction of **Hardware Security Modules** as a foundational layer provided the necessary physical isolation.

This synthesis creates a defense-in-depth strategy, combining the mathematical guarantees of **Threshold Cryptography** with the physical tamper-resistance of dedicated hardware, addressing the primary concerns of institutional risk managers and auditors.

![A digitally rendered structure featuring multiple intertwined strands in dark blue, light blue, cream, and vibrant green twists across a dark background. The main body of the structure has intricate cutouts and a polished, smooth surface finish](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-derivatives-market-volatility-interoperability-and-smart-contract-composability-in-decentralized-finance.webp)

## Theory

The mathematical foundation of **MPC-HSM Hybrid** relies on **Threshold Signature Schemes** where the secret key is never reconstructed in its entirety. The signing process involves nodes generating partial signatures that are combined off-chain to form a valid blockchain transaction.

- **Secret Sharing**: The master key is partitioned using schemes such as Shamir or Gennaro-Goldfeder, ensuring security against colluding subsets of participants.

- **Policy Enforcement**: The **HSM** acts as a gatekeeper, verifying transaction parameters against pre-defined rules before permitting the release of a partial signature.

- **Adversarial Resilience**: The system maintains functionality even if a portion of the nodes are compromised or offline, assuming the threshold for signature generation is met.

> The security of the hybrid model is predicated on the impossibility of compromising both the cryptographic threshold and the physical isolation of the hardware modules simultaneously.

This architecture shifts the threat model from protecting a single repository to securing a distributed network. The complexity of orchestrating an attack increases exponentially as the number of independent nodes and distinct hardware vendors rises. 

| Metric | Centralized Custody | MPC-HSM Hybrid |
| --- | --- | --- |
| Failure Mode | Single point of compromise | Threshold compromise required |
| Latency | Low | Medium |
| Auditability | Opaque | High transparency |

![A high-tech, abstract rendering showcases a dark blue mechanical device with an exposed internal mechanism. A central metallic shaft connects to a main housing with a bright green-glowing circular element, supported by teal-colored structural components](https://term.greeks.live/wp-content/uploads/2025/12/collateralized-defi-protocol-architecture-demonstrating-smart-contract-automated-market-maker-logic.webp)

## Approach

Current implementations prioritize operational agility while maintaining strict compliance with financial regulations. Organizations deploy nodes across geographically distributed environments to mitigate jurisdictional and physical risks. The workflow involves a rigorous validation pipeline:

- An initiator proposes a transaction request.

- The request passes through an automated risk engine.

- Each participating **HSM** validates the transaction against stored policy sets.

- Nodes produce partial signatures only if all internal checks pass.

- The aggregator assembles the final transaction for broadcast.

This structured approach allows for programmable governance, where multisig requirements are enforced at the hardware level. It removes the human element from the immediate signing process, significantly reducing the surface area for social engineering or insider threats.

![A three-quarter view of a mechanical component featuring a complex layered structure. The object is composed of multiple concentric rings and surfaces in various colors, including matte black, light cream, metallic teal, and bright neon green accents on the inner and outer layers](https://term.greeks.live/wp-content/uploads/2025/12/a-visualization-of-complex-financial-derivatives-layered-risk-stratification-and-collateralized-synthetic-assets.webp)

## Evolution

The transition from early, monolithic cold storage to distributed, hardware-backed architectures reflects the maturing requirements of the crypto derivatives market. Early iterations struggled with performance bottlenecks, as the overhead of **MPC** coordination often hindered high-frequency trading strategies.

Technological advancements in **Zero-Knowledge Proofs** and optimized cryptographic primitives have drastically reduced the computational cost of generating signatures. Modern systems now support complex, conditional transaction types, enabling advanced strategies like automated liquidation or rebalancing without manual intervention.

> The shift toward hybrid architectures reflects the industry transition from simple asset storage to complex, automated, and policy-driven financial infrastructure.

Consider the broader context of decentralized systems; the history of human organization often mirrors this movement from centralized power to distributed, trustless cooperation, where the architecture of the system itself dictates the boundaries of possible behavior. We are witnessing the automation of institutional trust, where code and hardware replace the subjective judgment of centralized intermediaries.

![A composition of smooth, curving ribbons in various shades of dark blue, black, and light beige, with a prominent central teal-green band. The layers overlap and flow across the frame, creating a sense of dynamic motion against a dark blue background](https://term.greeks.live/wp-content/uploads/2025/12/multi-layered-market-dynamics-and-implied-volatility-across-decentralized-finance-options-chain-architecture.webp)

## Horizon

Future developments in this domain focus on increasing the flexibility of the **MPC** protocol to handle cross-chain interoperability and complex smart contract interactions. We anticipate a tighter integration with decentralized identity standards, allowing for more granular, identity-aware signing policies.

The next phase will involve the transition to **Trusted Execution Environments** that offer greater scalability while maintaining the security properties of dedicated hardware. This will likely lower the cost of entry for smaller institutions, potentially leading to a democratization of institutional-grade security.

| Trend | Implication |
| --- | --- |
| Cross-Chain Signing | Increased liquidity efficiency |
| TEE Integration | Lower operational overhead |
| Policy Automation | Reduced manual intervention |

The ultimate trajectory leads to the seamless embedding of these security primitives into the protocol layer itself. This would make secure, distributed custody the default state for all participants, fundamentally changing the nature of risk in digital asset markets.

## Glossary

### [Security Modules](https://term.greeks.live/area/security-modules/)

Architecture ⎊ Security Modules, within the context of cryptocurrency, options trading, and financial derivatives, represent layered systems designed to isolate and protect critical functions.

### [Digital Asset](https://term.greeks.live/area/digital-asset/)

Asset ⎊ A digital asset, within the context of cryptocurrency, options trading, and financial derivatives, represents a tangible or intangible item existing in a digital or electronic form, possessing value and potentially tradable rights.

## Discover More

### [Zero-Knowledge Security](https://term.greeks.live/term/zero-knowledge-security/)
![A sleek dark blue surface forms a protective cavity for a vibrant green, bullet-shaped core, symbolizing an underlying asset. The layered beige and dark blue recesses represent a sophisticated risk management framework and collateralization architecture. This visual metaphor illustrates a complex decentralized derivatives contract, where an options protocol encapsulates the core asset to mitigate volatility exposure. The design reflects the precise engineering required for synthetic asset creation and robust smart contract implementation within a liquidity pool, enabling advanced execution mechanisms.](https://term.greeks.live/wp-content/uploads/2025/12/green-underlying-asset-encapsulation-within-decentralized-structured-products-risk-mitigation-framework.webp)

Meaning ⎊ Zero-Knowledge Security enables verifiable privacy for crypto derivatives by allowing complex financial actions to be proven valid without revealing underlying sensitive data, mitigating front-running and enhancing market efficiency.

### [Blockchain Transaction Security](https://term.greeks.live/term/blockchain-transaction-security/)
![This abstract rendering illustrates the layered architecture of a bespoke financial derivative, specifically highlighting on-chain collateralization mechanisms. The dark outer structure symbolizes the smart contract protocol and risk management framework, protecting the underlying asset represented by the green inner component. This configuration visualizes how synthetic derivatives are constructed within a decentralized finance ecosystem, where liquidity provisioning and automated market maker logic are integrated for seamless and secure execution, managing inherent volatility. The nested components represent risk tranching within a structured product framework.](https://term.greeks.live/wp-content/uploads/2025/12/intricate-on-chain-risk-framework-for-synthetic-asset-options-and-decentralized-derivatives.webp)

Meaning ⎊ ZK-Solvency is the cryptographic mechanism that uses zero-knowledge proofs to continuously and privately verify an exchange's reserves exceed its total liabilities.

### [Volatility Management](https://term.greeks.live/term/volatility-management/)
![An abstract visualization representing the intricate components of a collateralized debt position within a decentralized finance ecosystem. Interlocking layers symbolize smart contracts governing the issuance of synthetic assets, while the various colors represent different asset classes used as collateral. The bright green element signifies liquidity provision and yield generation mechanisms, highlighting the dynamic interplay between risk parameters, oracle feeds, and automated market maker pools required for efficient protocol operation and stability in perpetual futures contracts.](https://term.greeks.live/wp-content/uploads/2025/12/synthesized-asset-collateral-management-within-a-multi-layered-decentralized-finance-protocol-architecture.webp)

Meaning ⎊ Volatility management in crypto involves using derivatives to hedge against or monetize price variance, moving beyond traditional models to address decentralized market microstructure and high-gamma risk.

### [Data Source Integrity](https://term.greeks.live/term/data-source-integrity/)
![A sleek blue casing splits apart, revealing a glowing green core and intricate internal gears, metaphorically representing a complex financial derivatives mechanism. The green light symbolizes the high-yield liquidity pool or collateralized debt position CDP at the heart of a decentralized finance protocol. The gears depict the automated market maker AMM logic and smart contract execution for options trading, illustrating how tokenomics and algorithmic risk management govern the unbundling of complex financial products during a flash loan or margin call.](https://term.greeks.live/wp-content/uploads/2025/12/unbundling-a-defi-derivatives-protocols-collateral-unlocking-mechanism-and-automated-yield-generation.webp)

Meaning ⎊ Data Source Integrity in crypto options refers to the reliability of price feeds, which determines collateral valuation and settlement fairness, serving as a critical defense against systemic risk.

### [Automated Liquidation Systems](https://term.greeks.live/term/automated-liquidation-systems/)
![A futuristic, precision-guided projectile, featuring a bright green body with fins and an optical lens, emerges from a dark blue launch housing. This visualization metaphorically represents a high-speed algorithmic trading strategy or smart contract logic deployment. The green projectile symbolizes an automated execution strategy targeting specific market microstructure inefficiencies or arbitrage opportunities within a decentralized exchange environment. The blue housing represents the underlying DeFi protocol and its liquidation engine mechanism. The design evokes the speed and precision necessary for effective volatility targeting and automated risk management in complex structured derivatives markets.](https://term.greeks.live/wp-content/uploads/2025/12/precision-algorithmic-execution-and-automated-options-delta-hedging-strategy-in-decentralized-finance-protocol.webp)

Meaning ⎊ Automated Liquidation Systems are the algorithmic primitives that enforce collateral requirements in decentralized derivatives protocols to prevent bad debt and ensure systemic solvency.

### [Cryptographic Order Book System Design Future](https://term.greeks.live/term/cryptographic-order-book-system-design-future/)
![This intricate visualization depicts the core mechanics of a high-frequency trading protocol. Green circuits illustrate the smart contract logic and data flow pathways governing derivative contracts. The central rotating components represent an automated market maker AMM settlement engine, executing perpetual swaps based on predefined risk parameters. This design suggests robust collateralization mechanisms and real-time oracle feed integration necessary for maintaining algorithmic stablecoin pegging, providing a complex system for order book dynamics and liquidity provision in decentralized finance.](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-trading-infrastructure-visualization-demonstrating-automated-market-maker-risk-management-and-oracle-feed-integration.webp)

Meaning ⎊ Cryptographic Order Book System Design Future integrates zero-knowledge proofs and high-throughput matching to eliminate information leakage in decentralized markets.

### [Asset Management](https://term.greeks.live/term/asset-management/)
![A high-tech abstraction of interlocking components symbolizing the complex relationships within financial derivatives markets. The structure illustrates protocol composability in Decentralized Finance DeFi, where various assets like synthetic tokens and collateralized debt positions CDPs create a network of dependencies. The intertwined forms represent risk transfer mechanisms, such as options contract hedging and liquidity provision across different market segments. This visual metaphor captures the interdependence inherent in complex tokenomics and cross-chain interoperability, emphasizing the interconnected nature of modern crypto financial engineering.](https://term.greeks.live/wp-content/uploads/2025/12/interdependent-synthetic-asset-linkages-illustrating-defi-protocol-composability-and-derivatives-risk-management.webp)

Meaning ⎊ Asset management in crypto derivatives optimizes capital efficiency by leveraging complex financial instruments to actively manage risk and generate yield in volatile markets.

### [Smart Contract Risk Management](https://term.greeks.live/term/smart-contract-risk-management/)
![A complex structural assembly featuring interlocking blue and white segments. The intricate, lattice-like design suggests interconnectedness, with a bright green luminescence emanating from a socket where a white component terminates within a teal structure. This visually represents the DeFi composability of financial instruments, where diverse protocols like algorithmic trading strategies and on-chain derivatives interact. The green glow signifies real-time oracle feed data triggering smart contract execution within a decentralized exchange DEX environment. This cross-chain bridge model facilitates liquidity provisioning and yield aggregation for risk management.](https://term.greeks.live/wp-content/uploads/2025/12/interoperable-smart-contract-framework-visualizing-cross-chain-liquidity-provisioning-and-derivative-mechanism-activation.webp)

Meaning ⎊ Smart Contract Risk Management ensures the economic integrity of decentralized options protocols by mitigating technical vulnerabilities and game-theoretic exploits through robust code and autonomous monitoring systems.

### [Zero Knowledge Regulatory Reporting](https://term.greeks.live/term/zero-knowledge-regulatory-reporting/)
![A visual representation of the intricate architecture underpinning decentralized finance DeFi derivatives protocols. The layered forms symbolize various structured products and options contracts built upon smart contracts. The intense green glow indicates successful smart contract execution and positive yield generation within a liquidity pool. This abstract arrangement reflects the complex interactions of collateralization strategies and risk management frameworks in a dynamic ecosystem where capital efficiency and market volatility are key considerations for participants.](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-options-protocol-architecture-layered-collateralization-yield-generation-and-smart-contract-execution.webp)

Meaning ⎊ Zero Knowledge Regulatory Reporting enables decentralized derivatives protocols to cryptographically prove compliance with financial regulations without disclosing private user or proprietary data.

---

## Raw Schema Data

```json
{
    "@context": "https://schema.org",
    "@type": "BreadcrumbList",
    "itemListElement": [
        {
            "@type": "ListItem",
            "position": 1,
            "name": "Home",
            "item": "https://term.greeks.live"
        },
        {
            "@type": "ListItem",
            "position": 2,
            "name": "Term",
            "item": "https://term.greeks.live/term/"
        },
        {
            "@type": "ListItem",
            "position": 3,
            "name": "MPC-HSM Hybrid",
            "item": "https://term.greeks.live/term/mpc-hsm-hybrid/"
        }
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "Article",
    "mainEntityOfPage": {
        "@type": "WebPage",
        "@id": "https://term.greeks.live/term/mpc-hsm-hybrid/"
    },
    "headline": "MPC-HSM Hybrid ⎊ Term",
    "description": "Meaning ⎊ MPC-HSM Hybrid architecture secures digital assets by distributing private keys across hardened hardware modules to prevent single points of failure. ⎊ Term",
    "url": "https://term.greeks.live/term/mpc-hsm-hybrid/",
    "author": {
        "@type": "Person",
        "name": "Greeks.live",
        "url": "https://term.greeks.live/author/greeks-live/"
    },
    "datePublished": "2026-03-11T01:02:30+00:00",
    "dateModified": "2026-03-11T01:04:25+00:00",
    "publisher": {
        "@type": "Organization",
        "name": "Greeks.live"
    },
    "articleSection": [
        "Term"
    ],
    "image": {
        "@type": "ImageObject",
        "url": "https://term.greeks.live/wp-content/uploads/2025/12/visualizing-layered-risk-tranches-and-attack-vectors-within-a-decentralized-finance-protocol-structure.jpg",
        "caption": "A sharp-tipped, white object emerges from the center of a layered, concentric ring structure. The rings are primarily dark blue, interspersed with distinct rings of beige, light blue, and bright green. This abstract visualization represents complex financial concepts like structured products in the cryptocurrency space. The concentric rings symbolize different layers of a derivative instrument or protocol composability. The sharp object represents a sudden market event, a black swan occurrence, or a targeted exploit, penetrating the established risk management layers, or tranches. The green ring highlights specific exposure or potential vulnerability within the layered architecture. The image powerfully illustrates how systemic risk can propagate through interconnected components, impacting a protocol or portfolio and bypassing multiple security or risk barriers."
    },
    "keywords": [
        "Automated Policy Enforcement",
        "Blockchain Security Protocols",
        "Blockchain Transaction Integrity",
        "Consensus Based Signatures",
        "Cryptocurrency Custodial Solutions",
        "Cryptographic Key Distribution",
        "Cryptographic Key Security",
        "Decentralized Financial Infrastructure",
        "Decentralized Signing Process",
        "Digital Asset Custody",
        "Digital Asset Protection",
        "Digital Asset Risk Management",
        "Distributed Cryptography",
        "Distributed Key Management",
        "Distributed Node Architecture",
        "Financial Data Security",
        "Financial Derivative Security",
        "Hardware Security Modules",
        "HSM Integration",
        "HSM Policy Controls",
        "Identity Verification Protocols",
        "Institutional Crypto Derivatives",
        "Institutional Digital Asset Custody",
        "Institutional-Grade Security",
        "Key Management Systems",
        "Key Rotation Procedures",
        "MPC-HSM Hybrid",
        "Multi-Party Computation",
        "Policy Enforcement Mechanisms",
        "Private Key Fragmentation",
        "Private Key Sharding",
        "Protocol Level Security",
        "Risk Mitigation Strategies",
        "Root Secret Protection",
        "Secure Access Controls",
        "Secure Analytics Platforms",
        "Secure Application Development",
        "Secure Arbitration",
        "Secure Artificial Intelligence",
        "Secure Audit Trails",
        "Secure Authentication Methods",
        "Secure Authorization Policies",
        "Secure Autonomous Systems",
        "Secure Backup and Recovery",
        "Secure Business Continuity",
        "Secure Change Management",
        "Secure Cloud Computing",
        "Secure Code Execution",
        "Secure Collective Security",
        "Secure Communication Channels",
        "Secure Compliance Frameworks",
        "Secure Computer Vision",
        "Secure Conciliation",
        "Secure Configuration Management",
        "Secure Conflict Resolution",
        "Secure Cooperative Security",
        "Secure Critical Infrastructure",
        "Secure Cultural Preservation",
        "Secure Cyber Warfare",
        "Secure Data Encryption",
        "Secure Data Handling",
        "Secure Data Mining",
        "Secure Data Visualization",
        "Secure Decision Support Systems",
        "Secure Democracy",
        "Secure Deployment Strategies",
        "Secure Development Aid",
        "Secure Diplomacy",
        "Secure Disaster Recovery",
        "Secure Disaster Relief",
        "Secure Economic Growth",
        "Secure Economic Warfare",
        "Secure Edge Computing",
        "Secure Enclave Technology",
        "Secure Environmental Protection",
        "Secure Environmental Sustainability",
        "Secure Ethical Considerations",
        "Secure Financial Stability",
        "Secure Fog Computing",
        "Secure Global Governance",
        "Secure Good Governance",
        "Secure Hardware Architecture",
        "Secure Human Rights",
        "Secure Humanitarian Assistance",
        "Secure Incident Response",
        "Secure Industrial Control Systems",
        "Secure Information Retrieval",
        "Secure Information Warfare",
        "Secure Interface Design",
        "Secure International Relations",
        "Secure Internet of Things",
        "Secure Key Generation",
        "Secure Knowledge Discovery",
        "Secure Legal Frameworks",
        "Secure Machine Learning",
        "Secure Maintainability Practices",
        "Secure Market Integrity",
        "Secure Mediation",
        "Secure Multi-Party Computation",
        "Secure Multilateralism",
        "Secure National Security",
        "Secure National Sovereignty",
        "Secure Natural Language Processing",
        "Secure Negotiation",
        "Secure Network Infrastructure",
        "Secure Operational Practices",
        "Secure Patch Management",
        "Secure Peacebuilding",
        "Secure Peacekeeping",
        "Secure Performance Optimization",
        "Secure Poverty Reduction",
        "Secure Quality Assurance",
        "Secure Regional Security",
        "Secure Regulatory Compliance",
        "Secure Release Management",
        "Secure Reliability Engineering",
        "Secure Reporting Mechanisms",
        "Secure Robotics Automation",
        "Secure Rule of Law",
        "Secure Scalability Solutions",
        "Secure Semantic Analysis",
        "Secure Social Progress",
        "Secure Social Responsibility",
        "Secure Storage Solutions",
        "Secure System Design",
        "Secure System Monitoring",
        "Secure Testing Methodologies",
        "Secure Threat Intelligence",
        "Secure Transaction Signing",
        "Secure Transaction Throughput",
        "Secure Upgrade Procedures",
        "Secure User Experience",
        "Secure Vulnerability Management",
        "Secure Workflow Automation",
        "Single Point of Failure",
        "Tamper Resistant Hardware",
        "Tamper-Resistant Execution",
        "Threshold Cryptography",
        "Threshold Signature Schemes"
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "WebSite",
    "url": "https://term.greeks.live/",
    "potentialAction": {
        "@type": "SearchAction",
        "target": "https://term.greeks.live/?s=search_term_string",
        "query-input": "required name=search_term_string"
    }
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "WebPage",
    "@id": "https://term.greeks.live/term/mpc-hsm-hybrid/",
    "mentions": [
        {
            "@type": "DefinedTerm",
            "@id": "https://term.greeks.live/area/security-modules/",
            "name": "Security Modules",
            "url": "https://term.greeks.live/area/security-modules/",
            "description": "Architecture ⎊ Security Modules, within the context of cryptocurrency, options trading, and financial derivatives, represent layered systems designed to isolate and protect critical functions."
        },
        {
            "@type": "DefinedTerm",
            "@id": "https://term.greeks.live/area/digital-asset/",
            "name": "Digital Asset",
            "url": "https://term.greeks.live/area/digital-asset/",
            "description": "Asset ⎊ A digital asset, within the context of cryptocurrency, options trading, and financial derivatives, represents a tangible or intangible item existing in a digital or electronic form, possessing value and potentially tradable rights."
        }
    ]
}
```


---

**Original URL:** https://term.greeks.live/term/mpc-hsm-hybrid/
