- Lattice-based cryptography (Kyber/Dilithium)
- Hash-based signatures (SPHINCS+)
- Isogeny-based protocols
- Implementation vulnerabilities (side-channel, timing, probing)
- Post-quantum transition for critical infrastructure
Mathematical/cryptographic content:
- LWE problem hardness
- Structured lattices & module-LWE
- Hash trees & multi-target security models
- Fault injection countermeasures
Scientific Value: costruire la sicurezza che sopravvive ai QPU.