Webinar: Securing Post-Quantum Implementations Against Physical Attacks, July 10th

We are looking forward to hosting a webinar with eShard on the 10th July at 9am GMT and 5pm GMT.

We’ll dive into one of the most pressing questions in the community: Are physical attacks practical against post-quantum schemes in the real world? If yes, how to harden the code or the hardware? We’ll explore:
  • How can cryptographic algorithms and their implementations be targeted by physical attacks?
  • Leveraging a novel attack surface and increased complexity of post-quantum schemes for side-channel and fault injection attacks
  • A dive into ML-KEM (formerly known as CRYSTALS-Kyber), the first NIST-selected key encapsulation mechanism
  • A concrete example: how a CPA attack on NTT-based multiplication reveals secrets using simulated traces
  • First steps toward protection: how to shield NTT operations from side-channel leakage
  • We’ll wrap up by showing why hardening and validation must go hand-in-hand when deploying post-quantum cryptography in real devices

Please register for your preferred time below:

Webinar 9am GMT

Webinar 5pm GMT