SecAppDev 2026 lecture details
Post-Quantum Cryptography (PQC): The Risk of Being Late
Post-Quantum Cryptography (PQC) answers the threat posed by quantum computers. We discuss the emerging standards and national agencies' recommendations for migration. We conclude with performance benchmarks and crypto agility challenges.
Schedule TBD
Abstract
The imminent threat posed by quantum computers and public-key cryptographic systems forces a migration to Post-Quantum Cryptography (PQC). Following an examination of quantum computing advancements, we discuss the new and emerging PQC standards and the status of the NIST selection process. Additionally, we explore the migration recommendations and timelines from national agencies. Our talk concludes with an overview of performance benchmarks and an exploration of the challenges surrounding cryptographic agility.
Key takeaway
If you have not yet developed a PQC migration strategy, you should do so in the next 6 months.
Content level
Deep-dive
Target audience
Software developers and architectures, managers, cybersecurity researchers
Prerequisites
Basic understanding of public-key cryptography
Join us for SecAppDev. You will not regret it!
Grab your seat now
Bart Preneel
Full professor, COSIC - University of Leuven
Expertise: Applied cryptography, privacy, cybersecurity policy
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Security by default - A European perspective on cyber resilience
Deep-dive lecture by Freddy Dezeure in room Lemaire
A technical deep dive into how Microsoft implements security, resilience, and regulatory compliance at scale—mapping NIS2, DORA, and Secure‑by‑Default principles to concrete controls, engineering processes, and tenant‑level protections
Key takeaway: Learn how regulatory requirements become enforceable controls, measurable metrics, and practical Secure‑by‑Default engineering across cloud systems
EU CRA: Survival Workshop for Enterprise & Open Source
Deep-dive lecture by Roman Zhukov
A practical deep-dive into the EU CRA for Enterprise and Open Source. Features interactive "In Scope?", "Who Am I?" and a “Live Gap-Analysis” exercises to help navigating your compliance confidently.
Key takeaway: Transform CRA rules from a legal burden into an engineering advantage using open standards, clear role mapping, and practical guidelines.
The ongoing crypto wars
Introductory lecture by Bart Preneel
This talk traces crypto wars from limits on research and key escrow to Apple vs. FBI. It covers debates on scanning communications and EU plans for access to encrypted data, ending with privacy risks of the EU Digital Identity Wallet.
Key takeaway: Crypto wars show ongoing tension between privacy & surveillance, with growing risks to online privacy