Post-quantum TLS experiments
Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined …

Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined …
After I found myself in a vacation rental with Bas and Joost, we thought it would be fun to have a go at a few of hxp’s 2022 2023 ctf challenges as team #RU (long story relating to …
Conference talk about our publication KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems at SPACE 2022
We investigate the performance of KEMTLS and PQ instantiations of TLS 1.3 on embedded devices.
We investigate the performance of post-quantum TLS and KEMTLS clients in WolfSSL on embedded systems
Conference presentation of our KEMTLS formal analysis paper at ESORICS 2022
A tale of two models: Formal analysis of KEMTLS in Tamarin sofiaceli, Jonathan Hoyland, douglasstebila and me. Once upon a time... Observation: PQ signatures are quite big and/or …
We prove the security of KEMTLS in two Tamarin models. One mode is based on the Cremers et al. model of TLS 1.3; the other closely resembles our pen-and-paper proofs. These models …
The recent KEMTLS protocol (Schwabe, Stebila and Wiggers,CCS’20) is a promising design for a quantum-safe TLS handshake protocol. Focused on the web setting, wherein clients learn …
Invited lecture about TLS, its history and making TLS post quantum. I also discuss KEMTLS.