Thom Wiggers
  • Bio
  • Papers
  • Talks
  • News
  • Experience
  • Projects
  • Courses
ESC

Searching...

No results found

↑↓ Navigate ↵ Select
Powered by Hugo Blox
  • Publications
    • Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs
    • A Comprehensive Study of the Signal Handshake Protocol: Bundled Authenticated Key Exchange
    • Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol
    • Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures
    • Optimizations and Practicality of High-Security CSIDH
    • Post-Quantum TLS
    • TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android
    • KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
    • A tale of two models: formal verification of KEMTLS in Tamarin
    • KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round
    • Improving Software Quality in Cryptography Standardization Projects
    • Implementing and Measuring KEMTLS
    • More efficient post-quantum KEMTLS with pre-distributed public keys
    • Verifying Post Quantum Signatures in 8kB of RAM
    • Practically Solving LPN
    • Post-Quantum TLS without handshake signatures
    • Energy-efficient ARM64 Cluster with Cryptanalytic Applications: 80 cores that do not cost you an ARM and a leg
    • Solving LPN using Large Covering Codes
    • Implementing CAESAR candidate Prøst on ARM11
    • Implementing Prøst on ARM11
  • Recent & Upcoming Talks
    • Fully PQ TLS in the WWW
    • Hash-based Signatures: State and Backup Management draft-wiggers-hbs-state-01
    • How are we going to afford post-quantum authentication?
    • Update on State Management Recommendations draft-wiggers-hbs-state-00
    • PQ TLS and WebPKI (or: Are we PQ yet?)
    • Post-Quantum TLS
    • TLS: Are we PQ yet?
    • Hash-based Signatures: State and Backup Management
    • Managing state and backups in stateful hash-based signature schemes
    • Post-Quantum TLS
    • Ph.D. defense
    • TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android
    • KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
    • A tale of two models: formal analysis of KEMTLS in Tamarin
    • Invited Lecture: TLS and Post-Quantum (Applied Cryptography, Radboud University)
    • KEMTLS-PDK
    • KEMTLS: securing TLS connections from quantum adversaries
    • Thalia's Linux Workshop 2021
    • Post-Quantum TLS without handshake signatures
    • Post-Quantum TLS without handshake signatures at RWC 2021
    • Post-Quantum TLS without handshake signatures
    • Lunch talk: Post-Quantum TLS without handshake signatures
    • Solving LPN Using Large Covering Codes
  • Projects
    • Post-Quantum TLS with KEMs
    • Bachelor's thesis
  • Blog
    • Using Emoji in (pdf)LaTex
    • Post-quantum TLS experiments
    • hxp 2022 (2023) CTF writeup
    • LaTeX Tips and Tricks
    • Cloudflare Internship
    • Building confidence in cryptographic protocols
    • Making protocols post-quantum
    • Todoist, Omnifocus and Things 3 review
    • KEMTLS on the Cryptography.fm podcast
    • Dissecting Proctorio
    • Extract only needed citations from large bibfiles
    • Rephrasing TLS key exchange in terms of KEMs
    • Using (post-quantum) KEMs in TLS 1.3
    • Latincrypt paper!
    • Securing OpenSSH
    • Prøst at Student Research Conference
    • Bitcoin private key qrcode scraper
    • Deprecating fields in MongoEngine Documents
    • Prøst
    • Globally install powerline
    • Perfect forward secrecy and HSTS with nginx
    • Dave Eggers – The Circle
    • Certificate signing with an ePass2003
    • Blendle
    • Jekyll
    • Time-invariant equality in assembly
    • Music Review
    • OpenSC, Gentoo & Feitian ePass 2003
  • Experience
  • Slides
    • KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
    • A tale of two models: Formal analysis of KEMTLS in Tamarin
  • Documents
    • AuthKEM abridged
  • Courses
    • Hacking in C 2018-2019
      • Makefiles: recipes for binaries
    • Hacking in C 2019-2020
      • Lectures
      • Syllabus Hacking in C 2020
      • Assignments
      • Tutorial: command line
        • Other resources
      • Makefiles: recipes for binaries
  • Hacking in C 2018-2019
    • Makefiles: recipes for binaries
  • Hacking in C 2019-2020
    • Lectures
    • Syllabus Hacking in C 2020
    • Assignments
    • Tutorial: command line
    • Makefiles: recipes for binaries

On this page

  • Other resources
Courses
Hacking in C 2019-2020
Tutorial: command line

Getting around on the command line

These are the slides I used during the workshop

Other resources

  • MIT’s Missing Semester
  • Cheat sheet
  • Bash scripting cheat sheet
  • The Linux Command Line (free book)
  • Extensive shell scripting tutorial
docs
Last updated on 2020-03-19

← Syllabus Hacking in C 2020 2020-04-07
Makefiles: recipes for binaries 2018-12-21 →

© 2026 Thom Wiggers – CC 4.0 BY-SA

Made with Hugo Blox Kit. Build your site →