Learn Backend Development Part-Time, Online
Earn a Michigan Engineering AI Certificate — Stay Ahead of the AI Revolution
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to implement post-quantum cryptographic algorithms within the PKCS #11 framework in this 27-minute conference talk from DevConf.CZ 2025. Explore the emerging threat that quantum computers pose to current public key cryptography and discover NIST's newly standardized replacement algorithms for key exchange and digital signatures. Understand the fundamental concepts behind Key Encryption Mechanisms (KEMs) and how they can be constructed from both Key Exchange Algorithms (KEX) and Key Encryption Algorithms (KEA). Examine the evolution of signature algorithms, including new primitives that require signature processing before hash verification begins. Gain practical insights into how PKCS #11 accommodates these revolutionary cryptographic changes and delve into the technical workings of these next-generation algorithms that will secure our digital infrastructure against quantum computing threats.
Syllabus
Implementing Post Quantum algorithms in PKCS #11 - DevConf.CZ 2025
Taught by
DevConf