Practically Solving LPN
We analyse the difficulty of the LPN problem in restricted memory.

We analyse the difficulty of the LPN problem in restricted memory.
Talk about KEMTLS on Cloudflare TV
Workshop on getting around on the command line. As a good prep for the course Hacking in C, I will show you how to get around on the command line, how to manage your files and how …
Talk about Post-Quantum TLS without Handshake Signatures at RWC 2021 (virtual).
Conference talk about Post-Quantum TLS without Handshake Signatures at ACM CCS (virtual).
Douglas and I appeared on Nadim's new podcast ‘Cryptography FM’ to talk about KEMTLS
Talk about Post-Quantum TLS without Handshake Signatures at the Lorentz Workshop (virtual)
Department Lunch Talk about KEMTLS
This article previously appeared in Thalia’s Thabloid, in the 2019–2020 issue number 5. It was written at the end of May and may not reflect current practice at Radboud University. …
We present an alternative to TLS 1.3, by authenticating using only Key-Encapsulation Mechanisms. This allows us to get rid of handshake signatures, as post-quantum signature …