Conference Details
The PKI Consortium is excited to host its third hybrid Post-Quantum Cryptography (PQC) Conference on Wednesday, January 15, and Thursday, January 16, 2025. The event will take place at the Thompson Conference Center, University of Texas, Austin, Texas, US.
This conference is a premier gathering for decision-makers, technical leaders, and industry influencers from both public and private sectors who are deeply invested in the future of cryptography. Attendees can expect a diverse program featuring keynote speeches, breakout sessions, and panel discussions led by thought leaders in PQC.
The conference is open to all individuals interested in Post-Quantum Cryptography and is not limited to PKI Consortium members.
Date and location
Date: January 15 and 16, 2025
Location: Thompson Conference Center (University of Texas), Austin, Texas, US
Registration: Click here
- This event can be attended in-person or remotely, we strongly recommend to attend in person where possible.
- There are no costs to register or attend the conference.
- Travel, accommodation and living expenses are not covered, all attendees are responsible to cover their own expenses.
Accommodation
To make your stay in Austin as comfortable as possible, we’ve compiled a list of accommodation options near the Thompson Conference Center. Whether you’re looking for a budget-friendly option or a luxurious stay, you’ll find plenty of choices to suit your preferences. Visit the accommodation page for our detailed suggestions and helpful tips on booking your accommodation.
Sponsors
We are immensely grateful to our sponsors:
Become a Sponsor
Interested in sponsoring the Post-Quantum Cryptography Conference? For detailed information about sponsorship opportunities, please contact us. You can also download the sponsorship brochure for a comprehensive overview and pricing of our sponsorship packages.
Explore our sponsorship opportunitiesAgenda
The conference features a balanced program with strategic, informational, and educational sessions in the Plenary room, and technical deep dives in the Breakout room. Attendees can look forward to keynote speeches, interactive sessions, and panel discussions led by Post-Quantum Cryptography (PQC) experts. To ensure a focus on education, speakers are not permitted to promote products or services during presentations.
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
CEO at Data-Warehouse
Manager Cryptographic Technology Group at NIST
VP of Product at PQShield
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Director, Alliances - PQC Portfolio at Thales
Co-Founder & CEO at Crypto4A
Technology Strategist at DigiCert
VP Software Enginering at Keyfactor
Product Manager at Thales
Senior Scientist at VTT, Research Center of Finland
Head of Division at Bank of Italy
Vice President of Product Management at Entrust
CA Manager at Sectigo
Head of Quantum at Banco Santander
Senior Product Architect at Bundesdruckerei GmbH
Executive Director Cybersecurity Researcher at Wells Fargo
Product Security Architect at QuSecure, Inc
Senior FIPS Tester at DEKRA
Research Specialist at HPI Consulting & Florida State University
Scientist and Head of Department (Cyber Security - Quantum Technology) at C-DAC, Ministry of Electronics & IT (India)
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Research Engineer at Cloudflare
Software Security Architect at Entrust
Applied Scientist at Amazon Web Services (AWS)
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
Chief Technology Officer at Utimaco
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Chair PKI Consortium and Director of Technology Compliance at Entrust
Scientist at Society for Electronic Transactions and Security (SETS)
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
President and CEO at DirectTrust
Research Engineer at Cloudflare
Chief Compliance Officer at Sectigo
Chief PKI Officer at Keyfactor
Product Manager at NVIDIA
Opening
Albert de Ruiter - Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Quantum Computing: Between Hope and Hype
NIST Post-Quantum Cryptography Update
Andrew Regenscheid - Manager Cryptographic Technology Group at NIST
In August 2024, the National Institute of Standards and Technology (NIST) reached a pivotal moment by releasing the first three finalized Post-Quantum Cryptography (PQC) standards: FIPS 203, FIPS 204, and FIPS 205. These standards mark the beginning of a new era in cryptography, designed to protect against the future threat of quantum computing.
In this presentation, Mr. Andrew Regenscheid, Manager Cryptographic Technology Group at NIST, will provide an in-depth update on the newly established FIPS PQC standards. He will also discuss the ongoing efforts to standardize additional cryptographic algorithms, ensuring preparedness for potential vulnerabilities in the current standards.
Mr. Bill Newhouse, a cybersecurity engineer and Project Lead at the NIST National Cybersecurity Center of Excellence (NCCoE), will explain the urgency of transitioning to these new quantum-resistant cryptographic standards. He will also share practical strategies and best practices to facilitate the migration from existing public-key cryptographic systems to these next-generation standards.
Transitioning National Security Systems to a Post Quantum Future
Migrating and benchmarking a banking application
ELI5: Implementing Digital Certificates for a Post-Quantum World
Architecting PKI Hierarchies for Graceful PQ Migration
Public Key Infrastructures (PKIs) are intricate systems to design, deploy, and maintain. As post-quantum cryptography (PQC) becomes a reality, one of the most challenging decisions will be algorithm selection. Historically, this has been straightforward—for example, using RSA-2048-SHA256 consistently throughout the PKI hierarchy. In a PQC world, this approach becomes less viable due to tradeoffs that may require different algorithms or parameters at each layer. For instance, long-term secure algorithms might be optimal for root CAs, high-performance algorithms for issuing CAs, and bandwidth-efficient algorithms for end entities.
Hybrid approaches further complicate these decisions, offering additional security or migration flexibility depending on the use case. This talk explores a “toolbox” of migration mechanisms for X.509 and presents example PKI hierarchies tailored to specific scenarios, illustrating how to navigate the complexity of algorithm choices for a graceful transition to post-quantum cryptography.
Strategies for Transitioning to Future-Proof Cryptography
Jaime Gómez García - Head of Quantum at Banco Santander
Scott Stuewe - President and CEO at DirectTrust
Update on end-to-end PKI and HSM integrations with ML-DSA
2025 is Here - How to get your PQC Readiness Plan Underway
Quantum-Safe Solutions for Permissioned Blockchain Networks: A Hyperledger Fabric Case Study
This presentation explores the integration of Post-Quantum Cryptographic (PQC) solutions within the permissioned blockchain framework of Hyperledger Fabric. Focusing on applications such as supply chain management, land registration, and certificate validation, the talk will highlight how Hyperledger Fabric has been tailored to meet security needs in both academia and industry. Public Key Infrastructure (PKI) is central to these implementations, ensuring identity management and secure communication via TLS validations, with chain codes customized for specific uses.
The rise of quantum computing presents significant vulnerabilities for classical cryptographic algorithms used within these blockchain networks. In response, a quantum-safe PKI using Crystal Dilithium-based digital signatures has been developed and tested within Hyperledger Fabric, achieving successful implementation. Attempts to integrate SPINCS+, however, revealed compatibility challenges, emphasizing the need for adapting permissioned blockchain systems as quantum threats emerge. This talk will share early results of deploying a PQC-enabled certifying authority in Hyperledger Fabric, offering insights into essential modifications for a quantum-resistant blockchain environment.
X9 Financial PKI: PQC Readiness and Crypto-Agility for Financial Services
Hybrid PQC E-Mail Communication: Easing Migration Pain
Secure e-mail communication is a natural fit for hybrid cryptography, offering long-term confidentiality and non-repudiation for users. This talk introduces a prototype system comprising a Certificate Authority, Certificate Management System, and an extended Open Source client application, including an integration module for Microsoft Outlook.
The presentation explores the selection criteria for hybrid schemes and the rationale behind choosing Composite and ICA approaches to facilitate PKI and S/MIME migration. It also shares insights from implementing and using pure PQC, Composite, and ICA hybrid constructions. Topics include certificate creation, client enrollment, and securely signing and encrypting e-mail messages using S/MIME across various cryptographic configurations, emphasizing the hybrid integration of classical and post-quantum secure cryptography.
Why the Internet isn’t ready for Post-Quantum Certificates
NIST has finalized the first set of post-quantum algorithms, and post-quantum key agreement has been enabled by default in browsers for over a year. Why are signatures lagging behind? This talk provides the latest updates in a fast-moving ecosystem, a recap of the challenges in migrating to post-quantum certificates, and an overview of ongoing efforts to make post-quantum signatures practical in the WebPKI.
In a followup breakout session, we go into detail into some of the more promising proposals for coping with post-quantum certificates.
Quantum-Safe Secure Boot: How hard can it be?
Secure boot is hard. Quantum-safe secure boot is even harder. It starts with the choice of a suitable algorithm. On the signature verification side, conflicting regulatory requirements on Post-Quantum/Traditional (PQ/T) hybrid mean there is no silver-bullet, while on the signature generation side, key management challenges and the lack of available end-to-end quantum-safe solutions further complicate the decision process.
In this talk we highlight open issues at various stages of the secure boot lifecycle.
Extending or Evolving: Choosing the Path to Quantum Readiness
Kunal Abhishek - Scientist and Head of Department (Cyber Security - Quantum Technology) at C-DAC, Ministry of Electronics & IT (India)
Making PQ Signatures work in the WebPKI
Post-quantum signatures are not easily deployable in the WebPKI. Using the signature algorithms recently standardized by NIST as drop-in replacements for existing classical algorithms on the Web would incur significant performance degradations, making this approach infeasible unless a cryptographically-relevant quantum computer (CRQCs) is imminent. There’s a real risk that post-quantum signatures do not see widespread adoption before CRQCs become a reality, unless we make changes to how signatures are used in the WebPKI.
This talk dives into several of the more promising proposals for making post-quantum signatures deployable, from TLS extensions to reduce the number of transmitted signatures, to using key agreement as an authentication mechanism, to complete overhauls of the WebPKI. We discuss ongoing work to evaluate the feasibility of each of these proposals and to address known unknowns.
(this is a 60 minute session)
To Hybrid or Not to Hybrid: Navigating the PQC Transition
Lory Thorpe - Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
As organizations prepare for the post-quantum era, hybrid cryptography has emerged as a contentious strategy. Advocates see it as a pragmatic bridge, combining classical algorithms with quantum-resistant counterparts—or even multiple quantum-resistant algorithms—to ensure security during the transition. Critics, however, argue that hybrid solutions introduce complexity, increase attack surfaces, and may delay full adoption of streamlined quantum-safe algorithms.
This panel brings together experts with diverse perspectives to debate the merits and drawbacks of hybrid cryptography. Should hybrid solutions be embraced as a stepping stone, or do they risk complicating the path to quantum readiness? Attendees will explore the technical, operational, and strategic implications of hybrid approaches, including the potential benefits and challenges of combining multiple quantum-resistant algorithms.
Closing remarks for day 1
Albert de Ruiter - Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
CEO at Data-Warehouse
Manager Cryptographic Technology Group at NIST
VP of Product at PQShield
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Director, Alliances - PQC Portfolio at Thales
Co-Founder & CEO at Crypto4A
Technology Strategist at DigiCert
VP Software Enginering at Keyfactor
Product Manager at Thales
Senior Scientist at VTT, Research Center of Finland
Head of Division at Bank of Italy
Vice President of Product Management at Entrust
CA Manager at Sectigo
Head of Quantum at Banco Santander
Senior Product Architect at Bundesdruckerei GmbH
Executive Director Cybersecurity Researcher at Wells Fargo
Product Security Architect at QuSecure, Inc
Senior FIPS Tester at DEKRA
Research Specialist at HPI Consulting & Florida State University
Scientist and Head of Department (Cyber Security - Quantum Technology) at C-DAC, Ministry of Electronics & IT (India)
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Research Engineer at Cloudflare
Software Security Architect at Entrust
Applied Scientist at Amazon Web Services (AWS)
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
Chief Technology Officer at Utimaco
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Chair PKI Consortium and Director of Technology Compliance at Entrust
Scientist at Society for Electronic Transactions and Security (SETS)
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
President and CEO at DirectTrust
Research Engineer at Cloudflare
Chief Compliance Officer at Sectigo
Chief PKI Officer at Keyfactor
Product Manager at NVIDIA
Update on the NIST standardization of additional signature schemes
In this presentation, Mr. Andrew Regenscheid, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
In October 2024, NIST announced 14 Second-Round candidates chosen from 40 First-Round submissions, including CROSS, LESS, and even MAYO, which might bring a bit of flavor to the new algorithms.
These algorithms were selected based on rigorous evaluations of security, performance, and unique algorithm characteristics, reflecting NIST’s ongoing commitment to diversifying post-quantum cryptographic standards. Dr. Moody will discuss each selected scheme’s potential, addressing key innovations and the next steps in the standardization process.
PQC Standardization at the Internet Engineering Task Force (IETF)
Just as post-quantum cryptography (PQC) has presented significant challenges for academic cryptographers, so too has it posed unique challenges for cryptographic engineers. The new PQC primitives, with their distinct characteristics compared to traditional RSA and ECC algorithms, often require substantial protocol and application redesign to accommodate them effectively. Moreover, the need for a relatively abrupt transition to PQC across the Internet’s vast infrastructure has introduced additional complexities.
This presentation will provide a comprehensive overview of the latest developments in PQC standardization within the IETF. We will delve into the challenges and progress made in integrating PQC into common Internet protocols, highlighting key areas where work is still underway. Additionally, we will explore the implications of the newly standardized algorithms (ML-DSA, SLH-DSA, ML-KEM, LMS, XMSS) and discuss the strategies for their successful deployment. Finally, we will share insights from our research on PKI PQ/traditional hybrid modes, which offer a promising approach for enhancing both security and migration flexibility during the transition to a post-quantum world.
Is CBOM Enough?
PQC Interoperability Project
PQC in FIPS 140-3, status and roadmap
ETSI ESI and Quantum-Safe Cryptography
ETSI ESI (Electronic Signatures and Trust Infrastructures) develops policies, security, and technical requirements for Trust Service Providers (TSPs), including certification authorities, time-stamping authorities, and providers of remote signature creation, validation, registered e-delivery, and long-term data preservation services. ETSI ESI also maintains Trusted Lists, which enhance confidence in digital certificates and services by indicating TSP compliance with recognized approval schemes.
This presentation will explore how developments in Quantum-Safe Cryptography (QSC) and Post-Quantum Cryptography (PQC) affect ETSI ESI standards. It will highlight areas where changes from other standards development organizations (SDOs) may influence ETSI ESI work, discuss potential impacts on existing frameworks, and provide an estimated timeline for adoption by consumers and organizations.
Hardware Cryptographic Modules
Eric Amador - Product Manager at Thales
Giuseppe Damiano - Vice President of Product Management at Entrust
Nils Gerhardt - Chief Technology Officer at Utimaco
Lessons Learned from Testing Millions of Servers for Post-Quantum Compatibility
Protocol ossification delayed the rollout of TLS 1.3 for years, and has once again become a roadblock in the rollout of post-quantum cryptography. In a recent large-scale study of TLS servers, we assessed the deployment compatibility of post-quantum key agreements, uncovering surprising results and insights. Notably, we observed protocol ossification in areas beyond the well-known issue of fragmented ClientHello messages due to large key sizes. We believe more surprises will emerge with post-quantum certificates, making deployment far more complex than a “flip-of-a-switch” transition.
In this talk, we share our findings from the study, and emphasize the importance of testing early to identify potential post-quantum migration challenges rather than making assumptions about where issues may arise. We walk through the subtle deployment complexities and operational issues that can arise when managing the complexities of post-quantum PKI implementations, particularly for end-user connection stability. By offering practical insights, we hope to contribute to a smoother shift to the post-quantum era, enhancing crypto-agility and strengthening the reliability of the Web PKI as a by-product.
Crypto Asset Discovery Tooling – an Overview of Capabilities, Characteristics and Gaps
How much will ML-DSA Signatures affect Web Metrics after all?
Mila Anastasova - Applied Scientist at Amazon Web Services (AWS)
NIST National Cybersecurity Center of Excellence’s Migration to Post-Quantum Cryptography Project
The impact of ML-KEM and ML-DSA on mTLS connection Time-to-Last-Byte
Panos Kampanakis - Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Practical Insights from Following NIST SP 1800-38B
In this session, Dr. Alexander Löw from Data-Warehouse will share real-world experiences from the National Cybersecurity Center of Excellence (NCCoE) regarding the implementation of NIST SP 1800-38B. Alexander will delve into the practical application of public key application discovery tools within the context of transitioning to PQC.
Participants will gain insights into the step-by-step process outlined in SP 1800-38B, including identifying public key cryptographic algorithms in use, assessing their vulnerability to quantum attacks, developing a migration strategy, and implementing new PQC algorithms.
By walking through the challenges encountered, attendees gain insights into what to expect during their transition, and learn about the role and benefits of Cryptographic Agility, Cryptographic Inventory, Cryptographic Bill of Material (CBOM), Software Bill of Material (SBOM), and Cryptographic Governance, providing comprehensive insights based on real-world experiences from following the National Cybersecurity Center of Excellence (NCCoE).
X9.146 Quantum TLS
David Hook - VP Software Enginering at Keyfactor
Mike Ounsworth - Software Security Architect at Entrust
Communication among Financial Institutions: What are the available answers to the quantum threat?
Hybrid PQC Digital Signatures and SSI
Curriculum Development for Post-Quantum Workforce Development Programs
As we transition to Post-Quantum Cryptography (PQC), professionals across various sectors, initially in IT, finance, and business, must be retrained to implement the new NIST protocols and prepare for ongoing crypto-agile updates. This shift presents a unique challenge, as much of this retraining will need to occur on the job through workforce development programs rather than in traditional classroom settings.
This talk will focus on identifying effective strategies for developing retraining programs, drawing from past curriculum models in technologies such as High-Performance Computing and Artificial Intelligence. We will present examples of PQC retraining programs from the cybersecurity and finance sectors, demonstrating how to integrate open-source tutorials, training platforms, textbooks, and existing industry programs into a cohesive, customized curriculum that aligns with each professional’s responsibilities and already established long-term development goals.
This session will offer practical guidance to managers, team leaders and developers for designing their own PQC workforce development curricula, highlighting useful pedagogical frameworks, current tools, and available platforms.
Quantum Key Distribution – What is done and what is to come
Perspectives on the transition to PQC in the financial sector
Is your HSM quantum-ready? Here’s what you need to know!
Accelerated Quantum Supercomputing and Post-Quantum Cryptography
Securing Data in the Quantum Era: From the Root of Trust to Protecting Ecosystems
With advancements in Quantum Computing, the security of our data relies heavily on robust cryptographic solutions.
Hardware Security Modules (HSMs) with integrated Post-Quantum Cryptographic (PQC) algorithms become center stage for securing data in the Quantum Computing Era. Besides providing PQC algorithms, HSMs also secure and automate key distribution for “complex to manage” stateful hash-based signature algorithms and provide hardware acceleration to meet modern applications’ cryptographic needs.
Taking those advancements as starting point, the talk will shift gear and explore how security systems, comprising of software and hardware, use Post Quantum primitives to secure their operation. Important systems include Key Management, PKI, and File & Folder Encryption. The role of each system in the security framework will be discussed, focusing on specific PQC requirements.
The talk continues to move to the solution level, and will provide insights and lessons learned for the needs and challenges of securing an inter-banking system, a project currently at the research stage.
By the end of the session, attendees will have a good overview on the capabilities of cryptographic components, how those capabilities can be used by security solutions and what is needed next, to secure whole “Ecosystems” against Quantum Computer attacks on today’s cryptography.
Please be aware that speakers are not permitted to promote products or services during their presentations. While commercials, workshops, and pitches may include commercial information, the primary focus of the conference is on educational content.
This conference is made possible through the support of the Post-Quantum Cryptography Working Group and the following organizations:
For more information about the conference, please contact the PKI Consortium at [email protected].