
- This event has passed.
Webinar: Securing Post-Quantum Implementations Against Physical Attacks
July 10 @ 9:00 AM - 10:00 AM

Description
We’ll dive into one of the most pressing questions in the community:
Are physical attacks practical against post-quantum schemes in the real world? If yes, how to harden the code or the hardware?
We’ll explore:
How can cryptographic algorithms and their implementations be targeted by physical attacks?
Leveraging a novel attack surface and increased complexity of post-quantum schemes for side-channel and fault injection attacks.
A dive into ML-KEM (formerly known as CRYSTALS-Kyber), the first NIST-selected key encapsulation mechanism.
A concrete example: how a CPA attack on NTT-based multiplication reveals secrets using simulated traces.
First steps toward protection: how to shield NTT operations from side-channel leakage.
We’ll wrap up by showing why hardening and validation must go hand-in-hand when deploying post-quantum cryptography in real devices.
Share this post via:
Moore’s Law Wiki