Design of secure aggregation techniques in (D)FL to prevent attacks against the aggregator(s) or the learning network computation nodes. Homomorphic encryption, secure multiparty computation and differential privacy techniques will be applied. Much of these techniques provide post-quantum resistance in a natural way, since they are either based on hard problems over lattices, or provide theoretical security under certain assumptions of non-collusion.