Why attend the Technical Track?

The Technical Track on 6-7 November is designed for members of the business, government and research communities with a stake in cryptographic standardization on a global scale. This is a unique opportunity to engage with key members of the quantum-safe cryptography community, participate in practical and scientific discussions and move towards a standardized approach to quantum-safe cryptographic solutions.

The workshop will showcase both the most recent requirements from industry and government, and cutting-edge potential solutions coming out of the most recent research.

A range of research and commercial presentations will focus on state-of-the-art quantum key distribution and the new encryption algorithms that will protect the world's communications. Some of the next-generation standards development work currently in progress at ETSI and other international standards organizations will be reviewed.

Our goal is to identify and give focus to further research and development on quantum-safe cryptography and its application.

Additionally, poster sessions will be shown during the technical track's networking breaks.

  • 09.00 Event Opening 
  • 09.10 SESSION 1: World Tour, chaired by Colin Whorlow, NCSC

    9.10 USA: Speaker to be named

    9.30 China: Zhengfu Han, State Cryptography Standardization Technical Committee (CSTC)

    9.50 UK: Michael Groves, NCSC

    10.10 Canada: Bridget Walshe, Canadian Centre for Cyber Security

    10.30 The Netherlands: Jaya Baloo, KPN

  • 10.50 Coffee and Networking Break, Poster Sessions and Table Tops Visits, Poster



  • 11.30 Session 2: Collaborative Efforts
    • 11.30 The Second Round of NIST PQC Standardization -safecrypto/successor
      Dustin Moody and Lily Chen, NIST
    • 11.45 ETSI QKD ISG
      Martin Ward, ETSI ISG QKD Secretary, Toshiba
    • 12.00 TC Cyber QSC
      Mark Pecen, ETSI QSC Chairman
    • 12.15 ITU: work in SG17/SG13
      Matthieu Legré, IDQ
  • 12.30 Networking Lunch, Poster Sessions and Table Tops Visits
  • 14.00 Collaborative Efforts, part 2, chaired by Mark Pecen - Approach Infinity, Inc.

    14.00 ISO
    Lily Chen, NIST

    14.15 IETF/IRFT/CFRG
    Nick Sullivan, Cloudflare

    14.30 China Post-Quantum Competition
    Hong Xiang, Chongking University

    14.45 Agile Quantum Safe Communications
    Andrew Shields, Toshiba Research Europe Ltd

    15.00 Questions and Answers

  • 15.15 Networking Coffee, Poster Sessions and Table Tops Visits
  • 16.00 Session 3: Toward The Quantum Cryptanalysis Of Today's Schemes
    • 16.00 Topological qubit platform
      Krysta Svore, Microsoft
    • 16.15 Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes
      Vlad Gheorghiu, University of Waterloo
    • 16.30 Cryptoanalysis of known and attempted attacks on SIDH and SIKE
      Brandon Langenberg, PQSecure Technologies
    • 16.45 A Simple Key Reuse Attack on NTRU PPKE
      Jintai Ding, University of Cincinnaty
    • 17.00 Overview of where quantum algorithm are algorithmics
      Martin Roetteler, Microsoft
    • 17.15 Questions and Answers
  • 17.30 Close of the Day
  • 8.30 TENTATIVE PANEL Discussion on QKD in 5G

    Panel in construction

  • 9.00 Session 4: Use Cases
    • 09.00 Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
      Panos Kampanakis, Cisco
    • 9.15 Dedicated PKI Enhanced by Quantum Entropy
      William Copeland, Verizon
    • 9.30 The Quantum Vault – Custody of Digital Assets
      Bruno Huttner, IDQuantique
    • 9.45 Scalable Quantum-Safe Hierarchical Identity-based Encryption
      Sarah McCarthy, Queens University of Belfast
    • 10.00 Questions and Answers
  • 10.15 Networking Coffee, Poster Sessions and Table Tops Visits
  • 10.45 Session 5; Prototyping And Resource Constraints
    • 10.45 Taking integrated quantum encryption technologies out of the lab and into real word applications
      Chris Erven, University of Bristol
    • 11.00 A low-cost and time-effective Approach for migration of legacy IP networks to Post-Quantum Security
      Prashant Chugh and Rakesh Singh Rawat, CDOT India
    • 11.15 Open QKD Network – An open source QKD network project
      Xinhua Ling, Michele Mosca and Norbert Lütkenhaus, IQC, University of Watterloo
    • 11.30 Updates on the Open Quantum Safe project
      Christian Paquin, Microsoft Research
    • 11.45 Towards microjoule PQC: How does the post-quantum transition impact mobile device energy budgets?
      Markku-Juhani Saarinen, PQ Shield Ltd
    • 12.00 New Performance Results for SIKE in Resource-Constrained Environments
      Reza Azarderakhsh, Florida Atlantic University and Pqsecure Technology
    • 12.15 Questions and Answers
  • 12.30 Networking Lunch, Poster Sessions and Table Tops Visits
  • 14.00 Session 6: Hybrid Approaches To Migration, chaired by Shay Gueron, Amazon Web Services
    • 14.00 State of Hybrid and Composite PQC in IETF Certificate Standards
      Mike Ounsworth, Entrust Datacard
    • 14.15 Hybrid Key Agreement/KEM Construction and Integration to IPSEC IKEv2 VPN
      Basil Hess, Vladimir Soukharev and Derek Orpen, Infosec Global
    • 14.30 Maintaining Trust: An Alternative Approach to PQ Hybrids
      Roberta Faux and Jeffery Lataillle, Black Horse Solutions
    • 14.45 Questions and Answers
  • 15.00 Closing Discussion / Wrap Up led by Michele Mosca, IQC

The 7th ETSI-IQC Quantum-Safe Cryptography Workshop will be held in Amazon Web Services Headquarters in Seattle, US Amazon Meeting Center, 2031 7th Avenue, Seattle WA 98121WA 98121

The following Posters will be presented during the coffee and lunch breaks on 6 and 7 November 2019.

  • A low-cost and time-effective Approach for migration of legacy IP networks to Post-Quantum Security
    Chugh Prashant, CDOT India
  • Rapid Prototyping of PQC algorithms in FPGA using High level Synthesis (HLS) compiler tools
    Gaur Deepak, CDOT India
  • Post Quantum Cryptography and Quantum Resistant BlockChain
    Kommadi Bhagvan, Architect Corner
  • Performance metrics of Different PQC algorithms on ARM based Architecture
    Mandal Sabyasachi, CDOT India
  • QKD network development and standardization in China
    Lai Junsen, CAICT
  • Authenticated Key Exchange from Ring Learning with Errors
    Ding Jintai, University of Cincinnati
  • Hybrid KEM: Information theoretic & Computational
    Reihaneh Safavi-Naini, University of Calgari
Any Questions? Contact us