Thom Wiggers

Thom Wiggers

Senior Cryptography Researcher
Thom Wiggers is a cryptography researcher at PQShield. His PhD thesis was on the interactions of post-quantum cryptography with protocols, under the supervision of Peter Schwabe, at the Institute of Computing and Information Sciences, Radboud University in The Netherlands.

Energy-efficient ARM64 Cluster with Cryptanalytic Applications: 80 cores that do not cost you an ARM and a leg

Doing cryptanalysis on a small cluster built from 20 ODROID-C2 boards for under 1500 USD.

avatar
Thom Wiggers
Solving LPN Using Large Covering Codes featured image

Solving LPN Using Large Covering Codes

Since quantum computers are expected to break most of the cryptographic schemes we rely on today, we need to look at alternatives. Learning Parity with Noise (LPN) is mathematical …

avatar
Thom Wiggers

Makefiles: recipes for binaries

Some notes on writing Makefiles

avatar
Thom Wiggers

Makefiles: recipes for binaries

Some notes on writing Makefiles

avatar
Thom Wiggers

Rephrasing TLS key exchange in terms of KEMs

In the RFC for TLS 1.3 (RFC8446) especially, the key exchange is defined in terms of (EC)DH key shares being exchanged. This limits us to algorithms which support non-interactive …

avatar
Thom Wiggers

Using (post-quantum) KEMs in TLS 1.3

The new TLS 1.3 standard \[1\] does not yet provide any support for post-quantum algorithms. In this blog post we’ll be talking about how we could negotiate a post-quantum key …

avatar
Thom Wiggers

Solving LPN using Large Covering Codes

Learning Parity with Noise (LPN) is a computational problem that we can use for cryptographic algorithms. It is suspected that LPN can not be solved (much) more efficiently on a …

avatar
Thom Wiggers

Latincrypt paper!

I’m going to Cuba as my submission to Latincrypt 2017 was accepted! The paper is called Energy-efficient ARM64 Cluster with Cryptanalytic Applications: 80 cores that do not cost …

avatar
Thom Wiggers

Securing OpenSSH

You can set up SSH to prefer Elliptic Curve cryptography over RSA, and use modern key exchange algorithms without exposing yourself to Logjam-style attacks. It’s also good to get …

avatar
Thom Wiggers

Implementing CAESAR candidate Prøst on ARM11

Prøst was a contestant in the CAESAR competition for Authenticated Encryption. I optimised Prøst for the ARM11 microprocessor architecture. By trying to find a provably minimal …

avatar
Thom Wiggers