Optimizations and Practicality of High-Security CSIDH
We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …
We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …
Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes …
Ph.D. defense of me' thesis entitled "Post-Quantum TLS".
Conference presentation of our paper
The ubiquitous use of smartphones has contributed to more and more users conducting their online browsing activities through apps, rather than web browsers. In order to provide a …
Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined …
Conference talk about our publication KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems at SPACE 2022
We investigate the performance of KEMTLS and PQ instantiations of TLS 1.3 on embedded devices.
We investigate the performance of post-quantum TLS and KEMTLS clients in WolfSSL on embedded systems
Conference presentation of our KEMTLS formal analysis paper at ESORICS 2022