We are looking forward to hosting a webinar with eShard on the 10th July at 9am GMT and 5pm GMT.
We’ll dive into one of the most pressing questions in the community: Are physical attacks practical against post-quantum schemes in the real world? If yes, how to harden the code or the hardware? We’ll explore:
- How can cryptographic algorithms and their implementations be targeted by physical attacks?
- Leveraging a novel attack surface and increased complexity of post-quantum schemes for side-channel and fault injection attacks
- A dive into ML-KEM (formerly known as CRYSTALS-Kyber), the first NIST-selected key encapsulation mechanism
- A concrete example: how a CPA attack on NTT-based multiplication reveals secrets using simulated traces
- First steps toward protection: how to shield NTT operations from side-channel leakage
- We’ll wrap up by showing why hardening and validation must go hand-in-hand when deploying post-quantum cryptography in real devices
Please register for your preferred time below: