Kemtls

TLS: Are we PQ yet? featured image

TLS: Are we PQ yet?

The TLS protocol (famous for `https://`) is perhaps the most-used cryptographic protocol. As such, it is extremely important that it gets migrated to post-quantum cryptography. …

avatar
Thom Wiggers
Post-Quantum TLS featured image

Post-Quantum TLS

I gave an overview of the challenges for transitioning TLS to PQC, and highlighted a number of proposals to mitigate the impact of large post-quantum signatures.

avatar
Thom Wiggers
Post-Quantum TLS featured image

Post-Quantum TLS

Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes …

avatar
Thom Wiggers

TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android

The ubiquitous use of smartphones has contributed to more and more users conducting their online browsing activities through apps, rather than web browsers. In order to provide a …

dimitri-mankowski

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

Conference talk about our publication KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems at SPACE 2022

avatar
Thom Wiggers

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

We investigate the performance of KEMTLS and PQ instantiations of TLS 1.3 on embedded devices.

ruben-gonzalez

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

We investigate the performance of post-quantum TLS and KEMTLS clients in WolfSSL on embedded systems

avatar
Thom Wiggers

A tale of two models: formal analysis of KEMTLS in Tamarin

Conference presentation of our KEMTLS formal analysis paper at ESORICS 2022

avatar
Thom Wiggers

A tale of two models: Formal analysis of KEMTLS in Tamarin

A tale of two models: Formal analysis of KEMTLS in Tamarin sofiaceli, Jonathan Hoyland, douglasstebila and me. Once upon a time... Observation: PQ signatures are quite big and/or …

avatar
Thom Wiggers

A tale of two models: formal verification of KEMTLS in Tamarin

We prove the security of KEMTLS in two Tamarin models. One mode is based on the Cremers et al. model of TLS 1.3; the other closely resembles our pen-and-paper proofs. These models …

Sofía Celi