Post Quantum Cryptography Training in Denmark

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 3 Days
  • Level: Fundamentals
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK Based Global Training Provider

Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.

Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.

Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.

High Level Overview of the class topics;

  • Introduction to post-quantum cryptography
  • Attacks on DLOG and factoring
  • Lattices and related algorithms
  • LWE and Regev's encryption scheme
  • NTRU and NTRUPrime
  • Codes and cryptosystems
  • Isogenies and elliptic curves
  • MQ problem and its variants
  • Other candidates for PQC
  • Side-channel attacks and countermeasures
We can organize this training at your preferred date and location. Contact Us!

Prerequisites

General knowledge of cryptography.

What You Will Learn

You will;

  • Be able to evaluate the security of different cryptographic primitives
  • Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
  • Have practical experience implementing and using post-quantum cryptographic schemes
  • Understand the mathematical foundations of post-quantum cryptography
  • Be familiar with the state-of-the-art in post-quantum cryptography
  • Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations

Training Outline

Day 1

Intro

Attacks Against DLOG and Factoring

  • Shor's Algorithm
  • NIST Competition

Lattices

  • Definitions
  • SVP, CVP, BDD
  • Good and Bad Basis
  • Babai Nearest Plane Algorithm
  • GGH Schemes and Attack Against Digital Signature Scheme
  • LWE
  • Regev's Encryption Scheme
  • Key Exchange from LWE
  • Ring LWE
  • Module LWE and LWR
  • Frodo, Kyber, Saber
  • NTRU and NTRUPrime
  • SIS Problem, Hash Function, and Digital Signature from SIS
  • Falcon
  • Lyubashevskys's ID Scheme
  • Dilithium
  • IBE and FHE

Day 2

Codes

  • Error Correcting Codes in General
  • Goppa Codes, Decoding Algorithm
  • McEliece Cryptosystem, Cryptanalysis History
  • BIKE and HQC
  • Niederreiter Cryptosystem, Syndrome Decoding
  • Trapdoor One-Way Function
  • Digital Signature Scheme Wave
  • Rank Metric Codes and Cryptosystems

Isogenies

  • Crash Course on Isogenies and Elliptic Curves
  • CGL Hash Function and SIDH
  • Security of SIDH, SIKE
  • Group Actions, CSIDH, and Applications
  • SQISign (High-Level Discussion)

Day 3

MQ

  • MQ Problem
  • Discussion about Its Hardness
  • Linearization, Gröbner Basis (High-Level Discussion)
  • Benchmarking Systems
  • Imai-Matsumoto, Hidden Field Equations
  • Variants of HFE
  • Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
  • Rainbow and Cryptanalysis Results for Both UOV and Rainbow
  • ID Scheme and GeMSS

Other Candidates

  • Hash-Based Signatures (SPHINCS+)
  • MPC-in-the-Head Signatures (Picnic)

Side-Channel Attacks

  • Basic Attacks
  • Countermeasures Against Physical and Implementation Attacks

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Post Quantum Cryptography Training in Denmark. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including Denmark, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Post Quantum Cryptography Training in Denmark. Our hand-picked classroom venues in Denmark offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginc IT Academy’s Onsite Post Quantum Cryptography Training in Denmark. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Available Training Dates

Join our public courses in our Denmark facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
20 april 2026 (3 Days)
Copenhagen, Aarhus, Odense
10 maj 2026 (3 Days)
Copenhagen, Aarhus, Odense
21 maj 2026 (3 Days)
Copenhagen, Aarhus, Odense
22 maj 2026 (3 Days)
Copenhagen, Aarhus, Odense
04 juni 2026 (3 Days)
Copenhagen, Aarhus, Odense
21 juni 2026 (3 Days)
Copenhagen, Aarhus, Odense
04 juli 2026 (3 Days)
Copenhagen, Aarhus, Odense
20 juli 2026 (3 Days)
Copenhagen, Aarhus, Odense

Other trainings and courses related to the Post Quantum Cryptography

Denmark consistently ranks as one of the most digitally advanced nations in the world, with Copenhagen and Aarhus serving as vibrant centers for green-tech and digital government solutions. The country’s commitment to digital transformation is backed by top-tier institutions like the Technical University of Denmark (DTU), which fosters innovation in sustainable energy software and biotechnology. Denmark’s business environment is highly digitized, requiring a workforce that is proficient in the latest enterprise solutions and cloud frameworks. Our training solutions in Denmark are focused on high-demand skills such as DevOps, Cyber Defense, and Agile management. We provide the expertise necessary for professionals to excel in a highly efficient, tech-driven economy that prioritizes innovation, sustainability, and digital integration.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.