Thom Wiggers

Thom Wiggers

Senior Cryptography Researcher
Thom Wiggers is a cryptography researcher at PQShield. His PhD thesis was on the interactions of post-quantum cryptography with protocols, under the supervision of Peter Schwabe, at the Institute of Computing and Information Sciences, Radboud University in The Netherlands.
LaTeX Tips and Tricks featured image

LaTeX Tips and Tricks

After a discussion on twitter I decided I should write down a few of the tips and tricks I’ve learnt over the years of writing papers and many other things in LaTeX.

avatar
Thom Wiggers

Improving Software Quality in Cryptography Standardization Projects

The NIST post-quantum cryptography (PQC) standardization project is probably the largest and most ambitious cryptography standardization effort to date, and as such it makes an …

Matthias J. Kannwischer

Cloudflare Internship

If you’re curious about some of the things I’ve worked on while at Cloudflare, see this post on Cloudflare’s internal blog.

avatar
Thom Wiggers

Building confidence in cryptographic protocols

An introduction to formal analysis and our proof of the security of KEMTLS.

avatar
Thom Wiggers
Making protocols post-quantum featured image

Making protocols post-quantum

Post-quantum key exchange and signature algorithms come with different trade-offs that we’re not used to. How do we handle that when updating protocols, and is this an opportunity …

avatar
Thom Wiggers

Todoist, Omnifocus and Things 3 review

A brief overview of three to-do/project management apps.

avatar
Thom Wiggers
KEMTLS-PDK featured image

KEMTLS-PDK

Conference talk about KEMTLS-PDK

avatar
Thom Wiggers

More efficient post-quantum KEMTLS with pre-distributed public keys

We make KEMTLS more efficient in scenarios where the client already has the server's long-term public key, for example through caching or because it's pre-installed.

Peter Schwabe

Implementing and Measuring KEMTLS

KEMTLS (CCS 2020) is a novel alternative to the Transport Layer Security (TLS) handshake that integrates post-quantum algorithms. It uses a key encapsulation mechanism (KEM) for …

Sofía Celi

Verifying Post Quantum Signatures in 8kB of RAM

In this paper, we study implementations of post-quantum signature schemes on resource-constrained devices. We focus on verification of signatures and cover NIST PQC round-3 …

ruben-gonzalez