Array
(
    [content] => 
    [params] => Array
        (
            [0] => /forum/threads/eshard-webinar-securing-post-quantum-implementations-against-physical-attacks.23315/
        )

    [addOns] => Array
        (
            [DL6/MLTP] => 13
            [Hampel/TimeZoneDebug] => 1000070
            [SV/ChangePostDate] => 2010200
            [SemiWiki/Newsletter] => 1000010
            [SemiWiki/WPMenu] => 1000010
            [SemiWiki/XPressExtend] => 1000010
            [ThemeHouse/XLink] => 1000970
            [ThemeHouse/XPress] => 1010570
            [XF] => 2021770
            [XFI] => 1050270
        )

    [wordpress] => /var/www/html
)

eShard Webinar: Securing Post-Quantum Implementations Against Physical Attacks

AmandaK

Administrator
Staff member
PQS_eShard-PQS-Webinar-news.png


In this webinar with eShard, we dive into one of the most pressing questions in the community: Are physical attacks practical against post-quantum schemes in the real world? If yes, how to harden the code or the hardware? We’ll explore:
  • - How can cryptographic algorithms and their implementations be targeted by physical attacks?
  • - Leveraging a novel attack surface and increased complexity of post-quantum schemes for side-channel and fault injection attacks
  • - A dive into ML-KEM (formerly known as CRYSTALS-Kyber), the first NIST-selected key encapsulation mechanism
  • - A concrete example: how a CPA attack on NTT-based multiplication reveals secrets using simulated traces
  • - First steps toward protection: how to shield NTT operations from side-channel leakage
  • - We’ll wrap up by showing why hardening and validation must go hand-in-hand when deploying post-quantum cryptography in real devices
Rafael Carrera RodriguezHardware Security Analyst

Rafael Carrera Rodriguez received the Master’s degree in Embedded Systems and Cybersecurity from Grenoble INP-Ensimag, France in 2021, and the PhD degree from the University of Montpellier, France in 2025. He is currently working as a Hardware Security Analyst at eShard, Pessac, France. His research interests involve secure embedded implementations of post-quantum cryptography, from both the attacks and countermeasures standpoints.

Dr Adrian Thilliard – Principal Security Analyst

Dr Adrian Thillard has over 12 years of experience in hardware security, with a background in side-channel analysis. Priori to joining PQShield, Adrian was a hardware security engineer in the Donjon team in Ledger and in the French National Security Agency. He holds a PhD degree from ENS Paris. The shift to Post-Quantum Cryptography (PQC) isn’t a distant concern – it’s a critical, near-term imperative for every organisation. As quantum capabilities advance, securing your data today against future decryption is paramount.

View on YouTube.

Link to Press Release
 
Back
Top