top of page

Foundations and Applications of Post-Quantum Security

Screen Shot 2026-01-19 at 2.30.19 PM.png

Rapid progress in quantum computing poses a fundamental threat to today’s public-key cryptographic infrastructure. Widely deployed schemes such as RSA, Diffie–Hellman, and elliptic-curve cryptography are vulnerable to quantum attacks, placing global communication systems, critical infrastructure, and long-term data confidentiality at risk. Post-Quantum Cryptography (PQC) aims to develop cryptographic algorithms that remain secure against both classical and quantum adversaries while being practical for real-world deployment.

 

This workshop brings together researchers and practitioners from cryptography, systems security, networking, and hardware to explore the design, analysis, standardization, and deployment challenges of post-quantum cryptographic systems. We aim to foster interdisciplinary discussion on transitioning to quantum-resistant security, understanding new attack surfaces, and ensuring trustworthy adoption across software, hardware, and networked environments.

 

We particularly encourage work that bridges theory and practice, including cryptographic constructions, security proofs, performance evaluations, implementation security, and migration strategies for PQC in large-scale systems.

 

We invite high-quality, previously unpublished research papers, position papers, experience reports, and system demos that address challenges and opportunities in post-quantum cryptography. Submissions combining theoretical rigor with empirical evaluation or deployment insights are especially encouraged.

Workshop Paper Submission Guidelines

  • Workshop Paper Submission Deadline: Feb. 20, 2026

  • Notification: March 20, 2026

  • Submission: 5 pages (IEEE conference format)

  • Presentation Mode: Hybrid (Only the workshop paper authors can choose their presentation modes.)

Topics of Interest
Topics include, but are not limited to:

Foundations of Post-Quantum Cryptography

PQC Standardization and Evaluation

  • Lattice-based, code-based, multivariate, isogeny-based, and hash-based cryptography

  • Security reductions and hardness assumptions in the post-quantum setting

  • Cryptanalysis of post-quantum schemes

  • Side-channel and fault attacks on PQC primitives

  • Analysis of NIST PQC finalists and standardized algorithms

  • Performance benchmarking and comparative evaluations

  • Parameter selection and security-performance tradeoffs

  • Cryptographic agility and algorithm lifecycle management

  • Post-quantum secure authentication and key exchange

  • PQC for cloud, edge, and distributed systems

  • Blockchain and distributed ledger security in the post-quantum era

  • Secure routing, control planes, and zero-trust architectures

PQC in Networked and Distributed Systems

Secure Implementations and Systems

Migration and Deployment Challenges

Applications and Emerging Domains

  • Constant-time and side-channel-resistant PQC implementations

  • Hardware acceleration and co-design for PQC

  • Embedded, IoT, and resource-constrained PQC deployments

  • Secure key management and certificate infrastructures for PQC

  • Hybrid classical–post-quantum cryptographic schemes

  • Transition strategies for TLS, VPNs, PKI, and secure messaging

  • Long-term data protection and “harvest-now, decrypt-later” threats

  • Backward compatibility and interoperability issues

  • Post-quantum security for critical infrastructure

  • PQC in healthcare, finance, and government systems

  • Secure software supply chains and firmware signing

  • Integration of PQC with secure AI and autonomous systems

Workshop Chairs

Program Committee Members

Jonathan Katz

Google Inc.

TBD

TBD

Sang-Yoon Chang

University of Colorado Colorado Springs

TBD

TBD

TBD

TBD

TBD

TBD

CONTACT US

event.manager AT svcsi.org

SUBSCRIBE FOR ALL SVCC-2026 UPDATES

QUESTIONS? 

LEAVE US A MESSAGE:

Thanks for submitting!

© All Copyrights @ SVCSI

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

bottom of page