Post Quantum Cryptography Training in United States of America

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 3 Days
  • Level: Fundamentals
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK Based Global Training Provider

Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.

Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.

Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.

High Level Overview of the class topics;

  • Introduction to post-quantum cryptography
  • Attacks on DLOG and factoring
  • Lattices and related algorithms
  • LWE and Regev's encryption scheme
  • NTRU and NTRUPrime
  • Codes and cryptosystems
  • Isogenies and elliptic curves
  • MQ problem and its variants
  • Other candidates for PQC
  • Side-channel attacks and countermeasures
We can organize this training at your preferred date and location. Contact Us!

Prerequisites

General knowledge of cryptography.

What You Will Learn

You will;

  • Be able to evaluate the security of different cryptographic primitives
  • Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
  • Have practical experience implementing and using post-quantum cryptographic schemes
  • Understand the mathematical foundations of post-quantum cryptography
  • Be familiar with the state-of-the-art in post-quantum cryptography
  • Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations

Training Outline

Day 1

Intro

Attacks Against DLOG and Factoring

  • Shor's Algorithm
  • NIST Competition

Lattices

  • Definitions
  • SVP, CVP, BDD
  • Good and Bad Basis
  • Babai Nearest Plane Algorithm
  • GGH Schemes and Attack Against Digital Signature Scheme
  • LWE
  • Regev's Encryption Scheme
  • Key Exchange from LWE
  • Ring LWE
  • Module LWE and LWR
  • Frodo, Kyber, Saber
  • NTRU and NTRUPrime
  • SIS Problem, Hash Function, and Digital Signature from SIS
  • Falcon
  • Lyubashevskys's ID Scheme
  • Dilithium
  • IBE and FHE

Day 2

Codes

  • Error Correcting Codes in General
  • Goppa Codes, Decoding Algorithm
  • McEliece Cryptosystem, Cryptanalysis History
  • BIKE and HQC
  • Niederreiter Cryptosystem, Syndrome Decoding
  • Trapdoor One-Way Function
  • Digital Signature Scheme Wave
  • Rank Metric Codes and Cryptosystems

Isogenies

  • Crash Course on Isogenies and Elliptic Curves
  • CGL Hash Function and SIDH
  • Security of SIDH, SIKE
  • Group Actions, CSIDH, and Applications
  • SQISign (High-Level Discussion)

Day 3

MQ

  • MQ Problem
  • Discussion about Its Hardness
  • Linearization, Gröbner Basis (High-Level Discussion)
  • Benchmarking Systems
  • Imai-Matsumoto, Hidden Field Equations
  • Variants of HFE
  • Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
  • Rainbow and Cryptanalysis Results for Both UOV and Rainbow
  • ID Scheme and GeMSS

Other Candidates

  • Hash-Based Signatures (SPHINCS+)
  • MPC-in-the-Head Signatures (Picnic)

Side-Channel Attacks

  • Basic Attacks
  • Countermeasures Against Physical and Implementation Attacks

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Post Quantum Cryptography Training in United States of America. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including United States of America, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Post Quantum Cryptography Training in United States of America. Our hand-picked classroom venues in United States of America offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginc IT Academy’s Onsite Post Quantum Cryptography Training in United States of America. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Available Training Dates

Join our public courses in our United States of America facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
20 April 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
10 May 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
21 May 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
22 May 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
04 June 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
21 June 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
04 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago
20 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago

Other trainings and courses related to the Post Quantum Cryptography

The United States continues to define the global frontier of technology and innovation, serving as the home to the world's most influential tech titans. From the legendary Silicon Valley and San Francisco Bay Area to emerging hubs like Austin, Seattle, and the Silicon Alley in New York, the US ecosystem remains unparalleled. Top-tier institutions such as MIT, Stanford, and Carnegie Mellon provide the research backbone for breakthroughs in Artificial Intelligence, Quantum Computing, and Cybersecurity. Our training programs are meticulously aligned with these industry-leading standards, ensuring that professionals can navigate the complexities of the modern digital landscape. We bridge the gap between academic theory and high-stakes corporate execution in the most competitive tech market on Earth.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.