Add to favorites:
Share:
Proposals are expected to contribute one or more of the following:
- Practical robust implementations of PQC schemes that can withstand implementation attacks including side-channel attacks, fault attacks and combined attacks, and design of automated tools for evaluating the security of PQC implementations. Comprehensive guidelines for implementing countermeasures against a wide range of attacks;
- Advances in understanding the quantum hardness of mathematical problem classes; new quantum algorithms and improvements in quantum programming and implementation; security validation methods; design of post-quantum schemes with improved security against quantum and AI-based attacks;
- Post-quantum schemes and protocols to support privacy-friendly applications and services, ncluding the secure and private use of electronic identities. Design of new digital signatures, key encapsulation mechanisms, and other schemes or use of existing ones to build new verification protocols.
Scope:
Securing PQC algorithm implementations is vital to protect against implementation attacks, such as side channel attacks, fault attacks and combinations of these, which may be amplified by deep learning. Current countermeasures incur significant overhead, and new approaches are needed to balance security and performance. Formal verification tools and methodologies can help achieve this goal and provide machine-readable evidence. Furthermore, to boost confidence in PQC systems, their security should be assessed, including the potential impact of new quantum algorithms or new optimizations of existing ones, also combined with AI.
Another key research area is digital trust in the post-quantum era, which requires transforming various areas, such as secure identities, data protection, access to essential services, and applications such as backup recovery, browser extensions and others into trusted and reliable solutions, via new post-quantum schemes and advanced building blocks for privacy-enhancing protocols.
Proposals should address one of the following technology areas:
- Development of solutions to prevent implementation attacks, balancing security, performance and cost; research in new attacks, including AI-powered ones, and/or combination of attacks, to inform secure design; creation of testing frameworks for automated security evaluations; improvement of formal verification methodologies.
- Quantum hardness analysis, via the study of the impact of new quantum algorithms or improvement of existing quantum algorithm implementations as well as the impact of AI-supported quantum attacks; analysis of cryptanalysis results; design of new post-quantum schemes using the information of the advances achieved/ fine-tuning of parameters sets.
- Design of quantum-resistant schemes and protocols supporting the field of privacy-friendly applications and services, including electronic identities, verification protocols and pseudonymous access options, protocols for attestation and anonymous attestation, for real world scenarios, via the design of new digital signature schemes and key encapsulation mechanisms, design of advanced cryptographic schemes, and usage of existing schemes in new protocols, for post-quantum digital identity and digital trust systems.
Expected Outcome
Proposals are expected to contribute one or more of the following:
- Practical robust implementations of PQC schemes that can withstand implementation attacks including side-channel attacks, fault attacks and combined attacks, and design of automated tools for evaluating the security of PQC implementations. Comprehensive guidelines for implementing countermeasures against a wide range of attacks;
- Advances in understanding the quantum hardness of mathematical problem classes; new quantum algorithms and improvements in quantum programming and implementation; security validation methods; design of post-quantum schemes with improved security against quantum and AI-based attacks;
- Post-quantum schemes and protocols to support privacy-friendly applications and services, ncluding the secure and private use of electronic identities. Design of new digital signatures, key encapsulation mechanisms, and other schemes or use of existing ones to build new verification protocols.
Scope
Securing PQC algorithm implementations is vital to protect against implementation attacks, such as side channel attacks, fault attacks and combinations of these, which may be amplified by deep learning. Current countermeasures incur significant overhead, and new approaches are needed to balance security and performance. Formal verification tools and methodologies can help achieve this goal and provide machine-readable evidence. Furthermore, to boost confidence in PQC systems, their security should be assessed, including the potential impact of new quantum algorithms or new optimizations of existing ones, also combined with AI.
Another key research area is digital trust in the post-quantum era, which requires transforming various areas, such as secure identities, data protection, access to essential services, and applications such as backup recovery, browser extensions and others into trusted and reliable solutions, via new post-quantum schemes and advanced building blocks for privacy-enhancing protocols.
Proposals should address one of the following technology areas:
- Development of solutions to prevent implementation attacks, balancing security, performance and cost; research in new attacks, including AI-powered ones, and/or combination of attacks, to inform secure design; creation of testing frameworks for automated security evaluations; improvement of formal verification methodologies.
- Quantum hardness analysis, via the study of the impact of new quantum algorithms or improvement of existing quantum algorithm implementations as well as the impact of AI-supported quantum attacks; analysis of cryptanalysis results; design of new post-quantum schemes using the information of the advances achieved/ fine-tuning of parameters sets.
- Design of quantum-resistant schemes and protocols supporting the field of privacy-friendly applications and services, including electronic identities, verification protocols and pseudonymous access options, protocols for attestation and anonymous attestation, for real world scenarios, via the design of new digital signature schemes and key encapsulation mechanisms, design of advanced cryptographic schemes, and usage of existing schemes in new protocols, for post-quantum digital identity and digital trust systems.
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our premium members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Premium now and never miss an important opportunity again! Already a premium member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our premium members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Premium now and explore your personalized technology matches today! Already a premium member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Premium: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a Premium member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our Premium knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Premium now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.

