Conference Details
The PKI Consortium is excited to host its third hybrid Post-Quantum Cryptography (PQC) Conference on Wednesday, January 15, and Thursday, January 16, 2025. The event will take place at the Thompson Conference Center, University of Texas, Austin, Texas, US.
This conference is a premier gathering for decision-makers, technical leaders, and industry influencers from both public and private sectors who are deeply invested in the future of cryptography. Attendees can expect a diverse program featuring keynote speeches, breakout sessions, and panel discussions led by thought leaders in PQC.
The conference is open to all individuals interested in Post-Quantum Cryptography and is not limited to PKI Consortium members.
Date and location
Date: January 15 and 16, 2025
Location: Thompson Conference Center (University of Texas), Austin, Texas, US
Registration: Click here
- This event can be attended in-person or remotely, we strongly recommend to attend in person where possible.
- There are no costs to register or attend the conference.
- Travel, accommodation and living expenses are not covered, all attendees are responsible to cover their own expenses.
Accommodation
To make your stay in Austin as comfortable as possible, we’ve compiled a list of accommodation options near the Thompson Conference Center. Whether you’re looking for a budget-friendly option or a luxurious stay, you’ll find plenty of choices to suit your preferences. Visit the accommodation page for our detailed suggestions and helpful tips on booking your accommodation.
Sponsors
We are immensely grateful to our sponsors:
Become a Sponsor
Interested in sponsoring the Post-Quantum Cryptography Conference? For detailed information about sponsorship opportunities, please contact us. You can also download the sponsorship brochure for a comprehensive overview and pricing of our sponsorship packages.
Explore our sponsorship opportunitiesAgenda
The conference features a balanced program with strategic, informational, and educational sessions in the Plenary room, and technical deep dives in the Breakout room. Attendees can look forward to keynote speeches, interactive sessions, and panel discussions led by Post-Quantum Cryptography (PQC) experts. To ensure a focus on education, speakers are not permitted to promote products or services during presentations.
Please note that this is a preliminary agenda and is subject to change. Final details, including topics, abstracts, speakers, panels, and time slots, will be updated here in the coming weeks and months, with more speakers and panels to be announced, we still have limited availability for speakers.
Propose a Talk or Panel
To get a sense of what to expect, you can also check out the agenda, slides, and recordings from our Amsterdam PQC Conference.
Policy Authority PKI Dutch Government (Logius)
CEO at Data-Warehouse
VP of Product at PQShield
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Co-Founder & CEO at Crypto4A
Mathematician & Project Lead, Post-Quantum Cryptography at NIST
Product Manager at Thales
Senior Scientist at VTT, Research Center of Finland
Head of Division at Bank of Italy
Vice President of Product Management at Entrust
CA Manager at Sectigo
Head of Quantum at Banco Santander
Senior Product Architect at Bundesdruckerei GmbH
Executive Director Cybersecurity Researcher at Wells Fargo
Product Security Architect at QuSecure, Inc
Research Specialist at HPI Consulting & Florida State University
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Research Engineer at Cloudflare
Researcher and Portfolio Manager Quantum Safe Technologies at Netherlands Organisation for Applied Scientific Research (TNO)
Senior Principal Engineer at Amazon Web Services (AWS)
Software Security Architect at Entrust
Computer and Electrical Engineering at Florida Atlantic University
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Chair PKI Consortium and Director of Technology Compliance at Entrust
Scientist at Society for Electronic Transactions and Security (SETS)
President and CEO at DirectTrust
Research Engineer at Cloudflare
Chief Compliance Officer at Sectigo
Chief PKI Officer at Keyfactor
Opening
Albert de Ruiter - Policy Authority PKI Dutch Government (Logius)
NIST Post-Quantum Cryptography Update
Dustin Moody - Mathematician & Project Lead, Post-Quantum Cryptography at NIST
In August 2024, the National Institute of Standards and Technology (NIST) reached a pivotal moment by releasing the first three finalized Post-Quantum Cryptography (PQC) standards: FIPS 203, FIPS 204, and FIPS 205. These standards mark the beginning of a new era in cryptography, designed to protect against the future threat of quantum computing.
In this presentation, Dr. Dustin Moody, a leading mathematician at NIST, will provide an in-depth update on the newly established FIPS PQC standards. He will also discuss the ongoing efforts to standardize additional cryptographic algorithms, ensuring preparedness for potential vulnerabilities in the current standards.
Mr. Bill Newhouse, a cybersecurity engineer and Project Lead at the NIST National Cybersecurity Center of Excellence (NCCoE), will explain the urgency of transitioning to these new quantum-resistant cryptographic standards. He will also share practical strategies and best practices to facilitate the migration from existing public-key cryptographic systems to these next-generation standards.
Strategies for Transitioning to Future-Proof Cryptography
Jaime Gómez García - Head of Quantum at Banco Santander
Scott Stuewe - President and CEO at DirectTrust
Migrating and benchmarking a banking application
To be announced shortly
Hybrid PQC Digital Signatures and SSI
ELI5: Implementing digital certificates for a post-quantum world
Update on end-to-end PKI and HSM integrations with ML-DSA
To be announced shortly
To be announced shortly
Why the Internet isn’t ready for post-quantum certificates
NIST has finalized the first set of post-quantum algorithms, and post-quantum key agreement has been enabled by default in browsers for over a year. Why are signatures lagging behind? This talk provides the latest updates in a fast-moving ecosystem, a recap of the challenges in migrating to post-quantum certificates, and an overview of ongoing efforts to make post-quantum signatures practical in the WebPKI.
In a followup breakout session, we go into detail into some of the more promising proposals for coping with post-quantum certificates.
Quantum-Safe Solutions for Permissioned Blockchain Networks: A Hyperledger Fabric Case Study
This presentation explores the integration of Post-Quantum Cryptographic (PQC) solutions within the permissioned blockchain framework of Hyperledger Fabric. Focusing on applications such as supply chain management, land registration, and certificate validation, the talk will highlight how Hyperledger Fabric has been tailored to meet security needs in both academia and industry. Public Key Infrastructure (PKI) is central to these implementations, ensuring identity management and secure communication via TLS validations, with chain codes customized for specific uses.
The rise of quantum computing presents significant vulnerabilities for classical cryptographic algorithms used within these blockchain networks. In response, a quantum-safe PKI using Crystal Dilithium-based digital signatures has been developed and tested within Hyperledger Fabric, achieving successful implementation. Attempts to integrate SPINCS+, however, revealed compatibility challenges, emphasizing the need for adapting permissioned blockchain systems as quantum threats emerge. This talk will share early results of deploying a PQC-enabled certifying authority in Hyperledger Fabric, offering insights into essential modifications for a quantum-resistant blockchain environment.
X9 Financial PKI: PQC Readiness and Crypto-Agility for Financial Services
Hybrid PQC E-Mail Communication: Easing Migration Pain
Secure e-mail communication is a natural fit for hybrid cryptography, offering long-term confidentiality and non-repudiation for users. This talk introduces a prototype system comprising a Certificate Authority, Certificate Management System, and an extended Open Source client application, including an integration module for Microsoft Outlook.
The presentation explores the selection criteria for hybrid schemes and the rationale behind choosing Composite and ICA approaches to facilitate PKI and S/MIME migration. It also shares insights from implementing and using pure PQC, Composite, and ICA hybrid constructions. Topics include certificate creation, client enrollment, and securely signing and encrypting e-mail messages using S/MIME across various cryptographic configurations, emphasizing the hybrid integration of classical and post-quantum secure cryptography.
To be announced shortly
Quantum-Safe Secure Boot: How hard can it be?
Secure boot is hard. Quantum-safe secure boot is even harder. It starts with the choice of a suitable algorithm. On the signature verification side, conflicting regulatory requirements on Post-Quantum/Traditional (PQ/T) hybrid mean there is no silver-bullet, while on the signature generation side, key management challenges and the lack of available end-to-end quantum-safe solutions further complicate the decision process.
In this talk we highlight open issues at various stages of the secure boot lifecycle.
To be announced shortly
Making PQ signatures work in the WebPKI
Post-quantum signatures are not easily deployable in the WebPKI. Using the signature algorithms recently standardized by NIST as drop-in replacements for existing classical algorithms on the Web would incur significant performance degradations, making this approach infeasible unless a cryptographically-relevant quantum computer (CRQCs) is imminent. There’s a real risk that post-quantum signatures do not see widespread adoption before CRQCs become a reality, unless we make changes to how signatures are used in the WebPKI.
This talk dives into several of the more promising proposals for making post-quantum signatures deployable, from TLS extensions to reduce the number of transmitted signatures, to using key agreement as an authentication mechanism, to complete overhauls of the WebPKI. We discuss ongoing work to evaluate the feasibility of each of these proposals and to address known unknowns.
(this is a 60 minute session)
To be announced shortly
Closing remarks for day 1
Albert de Ruiter - Policy Authority PKI Dutch Government (Logius)
Policy Authority PKI Dutch Government (Logius)
CEO at Data-Warehouse
VP of Product at PQShield
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Co-Founder & CEO at Crypto4A
Mathematician & Project Lead, Post-Quantum Cryptography at NIST
Product Manager at Thales
Senior Scientist at VTT, Research Center of Finland
Head of Division at Bank of Italy
Vice President of Product Management at Entrust
CA Manager at Sectigo
Head of Quantum at Banco Santander
Senior Product Architect at Bundesdruckerei GmbH
Executive Director Cybersecurity Researcher at Wells Fargo
Product Security Architect at QuSecure, Inc
Research Specialist at HPI Consulting & Florida State University
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Research Engineer at Cloudflare
Researcher and Portfolio Manager Quantum Safe Technologies at Netherlands Organisation for Applied Scientific Research (TNO)
Senior Principal Engineer at Amazon Web Services (AWS)
Software Security Architect at Entrust
Computer and Electrical Engineering at Florida Atlantic University
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Chair PKI Consortium and Director of Technology Compliance at Entrust
Scientist at Society for Electronic Transactions and Security (SETS)
President and CEO at DirectTrust
Research Engineer at Cloudflare
Chief Compliance Officer at Sectigo
Chief PKI Officer at Keyfactor
PQC Interoperability Project
PQC standardization at the Internet Engineering Task Force (IETF)
Just as post-quantum cryptography (PQC) has presented significant challenges for academic cryptographers, so too has it posed unique challenges for cryptographic engineers. The new PQC primitives, with their distinct characteristics compared to traditional RSA and ECC algorithms, often require substantial protocol and application redesign to accommodate them effectively. Moreover, the need for a relatively abrupt transition to PQC across the Internet’s vast infrastructure has introduced additional complexities.
This presentation will provide a comprehensive overview of the latest developments in PQC standardization within the IETF. We will delve into the challenges and progress made in integrating PQC into common Internet protocols, highlighting key areas where work is still underway. Additionally, we will explore the implications of the newly standardized algorithms (ML-DSA, SLH-DSA, ML-KEM, LMS, XMSS) and discuss the strategies for their successful deployment. Finally, we will share insights from our research on PKI PQ/traditional hybrid modes, which offer a promising approach for enhancing both security and migration flexibility during the transition to a post-quantum world.
Is CBOM Enough?
PQC Interoperability Project
Hardware Cryptographic Modules
Bruno Couillard - Co-Founder & CEO at Crypto4A
Giuseppe Damiano - Vice President of Product Management at Entrust
ETSI ESI and Quantum-Safe Cryptography
ETSI ESI (Electronic Signatures and Trust Infrastructures) develops policies, security, and technical requirements for Trust Service Providers (TSPs), including certification authorities, time-stamping authorities, and providers of remote signature creation, validation, registered e-delivery, and long-term data preservation services. ETSI ESI also maintains Trusted Lists, which enhance confidence in digital certificates and services by indicating TSP compliance with recognized approval schemes.
This presentation will explore how developments in Quantum-Safe Cryptography (QSC) and Post-Quantum Cryptography (PQC) affect ETSI ESI standards. It will highlight areas where changes from other standards development organizations (SDOs) may influence ETSI ESI work, discuss potential impacts on existing frameworks, and provide an estimated timeline for adoption by consumers and organizations.
Crypto asset discovery tooling – an overview of capabilities, characteristics and gaps
Lessons learned from testing millions of servers for Post-Quantum compatibility
Protocol ossification delayed the rollout of TLS 1.3 for years, and has once again become a roadblock in the rollout of post-quantum cryptography. In a recent large-scale study of TLS servers, we assessed the deployment compatibility of post-quantum key agreements, uncovering surprising results and insights. Notably, we observed protocol ossification in areas beyond the well-known issue of fragmented ClientHello messages due to large key sizes. We believe more surprises will emerge with post-quantum certificates, making deployment far more complex than a “flip-of-a-switch” transition.
In this talk, we share our findings from the study, and emphasize the importance of testing early to identify potential post-quantum migration challenges rather than making assumptions about where issues may arise. We walk through the subtle deployment complexities and operational issues that can arise when managing the complexities of post-quantum PKI implementations, particularly for end-user connection stability. By offering practical insights, we hope to contribute to a smoother shift to the post-quantum era, enhancing crypto-agility and strengthening the reliability of the Web PKI as a by-product.
To be announced shortly
How much will ML-DSA signatures affect Web Metrics after all?
Mila Anastasova - Computer and Electrical Engineering at Florida Atlantic University
NIST National Cybersecurity Center of Excellence’s Migration to Post-Quantum Cryptography Project
The impact of ML-KEM and ML-DSA on mTLS connection Time-to-Last-Byte
Matthew Campagna - Senior Principal Engineer at Amazon Web Services (AWS)
Practical Insights from Following NIST SP 1800-38B
In this session, Dr. Alexander Löw from Data-Warehouse will share real-world experiences from the National Cybersecurity Center of Excellence (NCCoE) regarding the implementation of NIST SP 1800-38B. Alexander will delve into the practical application of public key application discovery tools within the context of transitioning to PQC.
Participants will gain insights into the step-by-step process outlined in SP 1800-38B, including identifying public key cryptographic algorithms in use, assessing their vulnerability to quantum attacks, developing a migration strategy, and implementing new PQC algorithms.
By walking through the challenges encountered, attendees gain insights into what to expect during their transition, and learn about the role and benefits of Cryptographic Agility, Cryptographic Inventory, Cryptographic Bill of Material (CBOM), Software Bill of Material (SBOM), and Cryptographic Governance, providing comprehensive insights based on real-world experiences from following the National Cybersecurity Center of Excellence (NCCoE).
To be announced shortly
Communication among Financial Institutions: What are the available answers to the quantum threat?
To be announced shortly
Curriculum Development for Post-Quantum Workforce Development Programs
As we transition to Post-Quantum Cryptography (PQC), professionals across various sectors, initially in IT, finance, and business, must be retrained to implement the new NIST protocols and prepare for ongoing crypto-agile updates. This shift presents a unique challenge, as much of this retraining will need to occur on the job through workforce development programs rather than in traditional classroom settings.
This talk will focus on identifying effective strategies for developing retraining programs, drawing from past curriculum models in technologies such as High-Performance Computing and Artificial Intelligence. We will present examples of PQC retraining programs from the cybersecurity and finance sectors, demonstrating how to integrate open-source tutorials, training platforms, textbooks, and existing industry programs into a cohesive, customized curriculum that aligns with each professional’s responsibilities and already established long-term development goals.
This session will offer practical guidance to managers, team leaders and developers for designing their own PQC workforce development curricula, highlighting useful pedagogical frameworks, current tools, and available platforms.
To be announced shortly
To be announced shortly
Is your HSM quantum-ready? Here’s what you need to know!
To be announced shortly
To be announced shortly
Please be aware that speakers are not permitted to promote products or services during their presentations. While commercials, workshops, and pitches may include commercial information, the primary focus of the conference is on educational content.
This conference is made possible through the support of the Post-Quantum Cryptography Working Group and the following organizations:
For more information about the conference, please contact the PKI Consortium at [email protected].