Webinar: Securing Post-Quantum Implementations Against Physical Attacks

The migration to Post-Quantum Cryptography (PQC) is no longer a distant theoretical challenge; it is an immediate reality. With the standardization of algorithms like ML-KEM under NIST FIPS 203, the industry's focus is rapidly shifting from mathematical theory to physical deployment.
While these algorithms are designed to withstand threats from quantum computers, how resilient are their physical implementations against Side-Channel Attacks (SCA)? The complexity and length of PQC algorithms introduce new vulnerabilities and auditing challenges for security evaluators.
Join industry experts from eShard and PQShield for an in-depth webinar exploring the critical intersection of post-quantum cryptography and hardware security.
🔗 Register for the webinar: https://u.eshard.com/RJDEw
What You Will Learn
This session will bypass the high-level quantum hype and dive directly into the hardware-level realities of PQC implementation. We will cover:
- The New Attack Surface: Understand the unique SCA challenges introduced by PQC primitives, including polynomial multiplications (NTT), SHA3, and complex sampling techniques.
- Practical Attack Demonstration: Watch a simulated Correlation Power Analysis (CPA) attack targeting an ML-KEM implementation using eShard’s esDynamic platform.
- Evaluating Defenses: Discover the effectiveness and limitations of standard countermeasures like hiding (jitter) and masking , and explore the inevitable trade-offs between robust security and optimal performance.
Who should attend
This webinar is highly recommended for Hardware Security Analysts, Embedded Systems Engineers, Cryptographers, and anyone involved in the practical transition to quantum-resistant architectures.
If your job involves putting cryptographic algorithms onto physical silicon, this session is built for you:
- Automotive & IoT Embedded Engineers: You're building the hardware Root of Trust for connected vehicles and devices. If an attacker can extract your post-quantum keys by monitoring the power consumption of a single Electronic Control Unit (ECU), the entire fleet is compromised.
- Smartcard & Secure Element Designers: Your hardware lives out in the wild—think payment cards, ePassports, and physical access controls. You need to know if your PQC implementation will survive physical tampering and power analysis at a retail checkout or a border crossing.
- Hardware Penetration Testers & Security Evaluators: We’ll show you exactly where these new algorithms tend to leak—like during polynomial multiplications using the Number Theoretic Transform (NTT) —so you know exactly what to hunt for during your next evaluation.
Join the session
If your team is preparing for post-quantum migration, now is the right time to look beyond the algorithm and evaluate the implementation.
Join eShard and PQShield for a technical session on securing post-quantum implementations against physical attacks.
🔗 Register for the webinar: https://u.eshard.com/RJDEw

