Post-Quantum

Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs

WireGuard is a VPN protocol with an efficient, DH-based handshake. Prior attempts at making it PQ heavily relied on Classic McEliece, which has deployment complications. We revisit …

Keitaro Hashimoto
How are we going to afford post-quantum authentication? featured image

How are we going to afford post-quantum authentication?

In this talk, I explain that although the focus on and progress with post-quantum key exchange is great, that does not mean that we should relax about post-quantum authentication. …

avatar
Thom Wiggers
Post-Quantum TLS featured image

Post-Quantum TLS

I gave a guest lecture on TLS and the challenges and ongoing efforts to make it work with post-quantum primitives.

avatar
Thom Wiggers
TLS: Are we PQ yet? featured image

TLS: Are we PQ yet?

The TLS protocol (famous for `https://`) is perhaps the most-used cryptographic protocol. As such, it is extremely important that it gets migrated to post-quantum cryptography. …

avatar
Thom Wiggers

Optimizations and Practicality of High-Security CSIDH

We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …

fabio-campos
Invited Lecture: TLS and Post-Quantum (Applied Cryptography, Radboud University) featured image

Invited Lecture: TLS and Post-Quantum (Applied Cryptography, Radboud University)

Invited lecture about TLS, its history and making TLS post quantum. I also discuss KEMTLS.

avatar
Thom Wiggers

Building confidence in cryptographic protocols

An introduction to formal analysis and our proof of the security of KEMTLS.

avatar
Thom Wiggers

More efficient post-quantum KEMTLS with pre-distributed public keys

We make KEMTLS more efficient in scenarios where the client already has the server's long-term public key, for example through caching or because it's pre-installed.

Peter Schwabe

Verifying Post Quantum Signatures in 8kB of RAM

In this paper, we study implementations of post-quantum signature schemes on resource-constrained devices. We focus on verification of signatures and cover NIST PQC round-3 …

ruben-gonzalez
KEMTLS: securing TLS connections from quantum adversaries featured image

KEMTLS: securing TLS connections from quantum adversaries

Talk about KEMTLS on Cloudflare TV

avatar
Thom Wiggers