BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SemiWiki - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:SemiWiki
X-ORIGINAL-URL:https://semiwiki.com
X-WR-CALDESC:Events for SemiWiki
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20270314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20271107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260602T100000
DTEND;TZID=America/Los_Angeles:20260602T110000
DTSTAMP:20260512T053121
CREATED:20260512T090611Z
LAST-MODIFIED:20260512T090611Z
UID:369189-1780394400-1780398000@semiwiki.com
SUMMARY:eShard Webinar: Securing Post-Quantum Implementations Against Physical Attacks
DESCRIPTION:In this webinar with eShard\, we dive into one of the most pressing questions in the community: Are physical attacks practical against post-quantum schemes in the real world? If yes\, how to harden the code or the hardware? We’ll explore: \n\n\n\n\n\n\nHow can cryptographic algorithms and their implementations be targeted by physical attacks?\nLeveraging a novel attack surface and increased complexity of post-quantum schemes for side-channel and fault injection attacks\nA dive into ML-KEM (formerly known as CRYSTALS-Kyber)\, the first NIST-selected key encapsulation mechanism\nA concrete example: how a CPA attack on NTT-based multiplication reveals secrets using simulated traces\nFirst steps toward protection: how to shield NTT operations from side-channel leakage\nWe’ll wrap up by showing why hardening and validation must go hand-in-hand when deploying post-quantum cryptography in real devices\n\nRafael Carrera Rodriguez – Hardware Security Analyst \nRafael Carrera Rodriguez received the Master’s degree in Embedded Systems and Cybersecurity from Grenoble INP-Ensimag\, France in 2021\, and the PhD degree from the University of Montpellier\, France in 2025. He is currently working as a Hardware Security Analyst at eShard\, Pessac\, France. His research interests involve secure embedded implementations of post-quantum cryptography\, from both the attacks and countermeasures standpoints. \nDr Adrian Thilliard – Principal Security Analyst \nDr Adrian Thillard has over 12 years of experience in hardware security\, with a background in side-channel analysis. Priori to joining PQShield\, Adrian was a hardware security engineer in the Donjon team in Ledger and in the French National Security Agency. He holds a PhD degree from ENS Paris. The shift to Post-Quantum Cryptography (PQC) isn’t a distant concern – it’s a critical\, near-term imperative for every organisation. As quantum capabilities advance\, securing your data today against future decryption is paramount. \n\n\n\n\n\nREGISTER HERE
URL:https://semiwiki.com/event/eshard-webinar-securing-post-quantum-implementations-against-physical-attacks/
LOCATION:Online
ATTACH;FMTTYPE=image/png:https://semiwiki.com/wp-content/uploads/2026/05/1778152020052.png
END:VEVENT
END:VCALENDAR