About the Workshop
This one-day workshop brings together key stakeholders from government, industry and research to discuss the practical transition toward post-quantum cryptography (PQC). The focus is on real-world deployment challenges, implementation trade-offs, and opportunities arising from the adoption of PQC.
- Talks by speakers from government and industry on current PQC deployment approaches
- Discussion of emerging challenges, including side-channel resistance
- A panel session on PQC transition strategies
- A poster session featuring students and early-career researchers
Registration
On-site attendance (limited to 80 participants):
https://www.kth.se/form/pqc
Online attendance:
https://www.kth.se/form/pqconline
Program
| 09:00–09:30 | Registration and Coffee |
|---|---|
| 09:30–09:40 |
Opening Remarks Elena Dubrova, KTH |
| Session 1: Industry Perspectives | |
| 09:40–10:20 |
Global PQC Standards, Policy Directions, and the Telecom Migration Journey John Preuß Mattsson, Ericsson AbstractThis talk provides an overview of the post‑quantum cryptography landscape, including essential background, the status of global standardization, and emerging government policies guiding migration. It then highlights the specific challenges for the mobile industry — spanning performance constraints, IoT‑driven size limitations, and long infrastructure lifecycles — and outlines how 5G and 6G standards are integrating quantum‑resistant algorithms. The session concludes with key priorities for telecom PQC migration, including PKI updates and secure roots‑of‑trust. |
| 10:20–10:40 |
Are We Side-Channel Mature Yet? Alexander Nilsson, Advenica AbstractThe recent PQC standardization process by NIST marks a major milestone in the transition to quantum-resistant algorithms. However, algorithmic security alone is insufficient if implementations remain vulnerable to side-channel attacks. This talk surveys side-channel attacks on the new FIPS PQC standards, with the goal of assessing their current implementation maturity. The analysis aims to highlight remaining challenges and provide insight into where further defensive effort is needed. |
| 10:40–11:00 |
Challenges of Space Security: Growth, Critical Services, and Long-Term Trust Kalle Ngo, OHB Sweden AbstractSpace systems are experiencing rapid growth and increasing reliance as providers of communications, navigation, and sensing services that are critical to both civilian and governmental users. This talk examines the security implications of this shift, focusing on how failures in satellite security propagate to real-world consequences on Earth. Using real-world incidents and architectural perspectives, the presentation highlights why space systems differ fundamentally from terrestrial IT systems, particularly in terms of lifetime, upgradability, and assurance constraints. These characteristics raise important questions about long-term cryptographic trust and motivate a discussion on how space systems can prepare for post-quantum threats through architectural and lifecycle-aware security design. |
| 11:00–11:20 | Coffee Break |
| Session 2: Industry and Public Sector Experiences | |
| 11:20–11:40 |
National Network for PQC in Healthdata/Medtech in Sweden Michel Silvestri, The Swedish eHealth Agency AbstractA national network has been formed to discuss and plan for preparations of PQC in the health data and medtech sectors. The Swedish eHealth Agency (E-hälsomyndigheten) is the convenor of the network which is constituted also by representation from e.g. other concerned healthcare, innovation and defence agencies, public and private healthcare providers, medtech and IT systems providers as well as cybersecurity enterprise, academia and research institutes, and standardisation organisations. This network has initiated projects using the EU Roadmap for the Transition to PQC as basis for preparing a proposal for a national sector-specific roadmap. The EU Roadmap states that sensitive data, such as health data, should be transitioned to PQC no later than 2030. In this presentation Michel Silvestri will describe this network, the initiated projects and other efforts for making Swedish health data quantum-safe. |
| 11:40–12:00 |
PQC Algorithms: Usage and Deployment Stephan Mueller, Atsec AbstractWith the available standardization of the algorithms of ML-DSA, ML-KEM and SLH-DSA, they are ready for deployment. Thus, replacing the existing algorithms of RSA, ECC and Diffie-Hellman may be considered straightforward. But is that a correct assumption? Unfortunately, these algorithms are no drop-in replacements for the classic algorithms and a number of considerations must be applied. This presentation outlines challenges and mitigation strategies of such challenges. The outlined mitigation strategies are significantly simplified by the previously unheard-of degrees of freedom the FIPS 203, 204, and 205 standards offer to integrators of these algorithms. By discussing the offered freedoms, a usage and deployment may be devised that provides an appropriate fit to the respective use case. Finally, existing network protocol updates are required for deploying the PQC algorithms. The current approaches integrating the PQC algorithms in the common network protocols of TLS, IKE/IPSec, and SSH are discussed. As part of the discussion, general ideas of timelines are also given. |
| 12:00–12:20 |
Estimation of Mutual Information: Uses in Cryptography and Cybersecurity Simon Calderon, Sectra AbstractQuantifying information leakage is an essential part to many parts of cybersecurity, with applications ranging from designing countermeasures to traffic analysis, to establishing rekeying guidelines in symmetric encryption, and evaluation of novel encryption algorithms such as PQC. In this talk I will introduce some ongoing research into using neural network estimators to quantify upper and lower bounds on mutual information, for use in cryptography and cybersecurity. |
| 12:20–13:20 | Lunch and Networking |
| Session 3: Government Authorities’ Recommendations | |
| 13:20–13:40 |
The PQC Transition – A European Perspective Alexander Engström, FRA AbstractTwo years ago the European Union initiated a coordinated transition to Post-Quantum Cryptography and created a group for the member states to work together. The group is situated within the framework for cooperation regarding the NIS2-directive, which is implemented as the new "cybersäkerhetslag" in Sweden. As the Swedish representative I will report on the work of this group and further implementation of it in Sweden, in particular the roadmap for the transition and recommended immediate action points. |
| 13:40–14:00 |
On the Quantum Threat to Cryptography, its Mitigation, and Our Research Martin Ekerå, Swedish NCSA, Swedish Armed Forces and KTH AbstractIn this short talk, we first briefly introduce the quantum threat to cryptography, provide advice on its mitigation, and discuss current mitigation challenges. We then give a brief overview of our public research into quantum cryptanalysis and post-quantum cryptography. This presentation will be given from the perspective of the Swedish NCSA. Some of the public research referenced herein was conducted at KTH by people funded or employed by the Swedish NCSA. |
| 14:00–14:20 | Coffee Break |
| Session 4: Panel Discussion and Posters | |
| 14:20–15:00 | Panel: “PQC Transition in Practice – What Swedish Organizations Should Do Now” |
| 15:00–15:30 | Poster Pitches |
| 15:30–17:00 | Poster Session and Mingle |
| 17:00 | End of Workshop |
Organization
General Chair: Prof. Carl-Mikael Zetterling (KTH)
Program Chairs: Prof. Elena Dubrova (KTH), Prof. Thomas Johansson (LTH)
Local Arrangements Chair: Pernilla Miller (KTH)
Contact
For questions, please contact: dubrova at kth.se or thomas.johansson at eit.lth.se