Add to favorites:
Share:
Projects’ results are expected to contribute to some or all of the following outcomes:
- Increasing the maturity of current post-quantum cryptographic algorithms and contribution to further standardisation;
- Easy-to-use tools for the large-scale implementation of post-quantum cryptographic algorithms, based on state-of-the-art standards;
- Secure and efficient transition from pre- to post-quantum encryption through tools implementing a hybrid approach combining recognised pre-quantum public key algorithms and additional post-quantum algorithms;
- Phase-in of post-quantum algorithms or protocols to new or existing applications;
- Demonstrators and good-practice implementations of post-quantum cryptographic algorithms on varied hardware and software platforms;
- Application-oriented recommendations for the widespread implementation of post-quantum cryptography across the EU.
Scope:
The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded - including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future still seems distant. There is a need to advance swiftly in the transition to quantum-resistant cryptography.
Post-quantum resistant cryptographic algorithms should be deployable in a dynamic manner in order to quickly react to new quantum computer developments. Recommendations for post-quantum cryptography have already been published, but have to be maintained up-to-date, Proposals received under this topic should contribute to developing coordinated European recommendations for the transition to post-quantum cryptography across the EU.
The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.
Expected Outcome
Projects’ results are expected to contribute to some or all of the following outcomes:
- Increasing the maturity of current post-quantum cryptographic algorithms and contribution to further standardisation;
- Easy-to-use tools for the large-scale implementation of post-quantum cryptographic algorithms, based on state-of-the-art standards;
- Secure and efficient transition from pre- to post-quantum encryption through tools implementing a hybrid approach combining recognised pre-quantum public key algorithms and additional post-quantum algorithms;
- Phase-in of post-quantum algorithms or protocols to new or existing applications;
- Demonstrators and good-practice implementations of post-quantum cryptographic algorithms on varied hardware and software platforms;
- Application-oriented recommendations for the widespread implementation of post-quantum cryptography across the EU.
Scope
The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded - including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future still seems distant. There is a need to advance swiftly in the transition to quantum-resistant cryptography.
Post-quantum resistant cryptographic algorithms should be deployable in a dynamic manner in order to quickly react to new quantum computer developments. Recommendations for post-quantum cryptography have already been published, but have to be maintained up-to-date, Proposals received under this topic should contribute to developing coordinated European recommendations for the transition to post-quantum cryptography across the EU.
The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our premium members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Premium now and never miss an important opportunity again! Already a premium member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our premium members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Premium now and explore your personalized technology matches today! Already a premium member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Premium: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a Premium member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our Premium knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Premium now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.