Research

Optimizations and Practicality of High-Security CSIDH

We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …

fabio-campos
Post-Quantum TLS featured image

Post-Quantum TLS

Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes …

avatar
Thom Wiggers
Ph.D. defense featured image

Ph.D. defense

Ph.D. defense of me' thesis entitled "Post-Quantum TLS".

avatar
Thom Wiggers
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android featured image

TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android

Conference presentation of our paper

dimitri-mankowski

TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android

The ubiquitous use of smartphones has contributed to more and more users conducting their online browsing activities through apps, rather than web browsers. In order to provide a …

dimitri-mankowski
Post-quantum TLS experiments featured image

Post-quantum TLS experiments

Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined …

avatar
Thom Wiggers

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

Conference talk about our publication KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems at SPACE 2022

avatar
Thom Wiggers

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

We investigate the performance of KEMTLS and PQ instantiations of TLS 1.3 on embedded devices.

ruben-gonzalez

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems

We investigate the performance of post-quantum TLS and KEMTLS clients in WolfSSL on embedded systems

avatar
Thom Wiggers

A tale of two models: formal analysis of KEMTLS in Tamarin

Conference presentation of our KEMTLS formal analysis paper at ESORICS 2022

avatar
Thom Wiggers