Optimizations and Practicality of High-Security CSIDH
We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …
We propose higher-security parametersets of CSIDH, and present highly-optimized implementations. We measure the performance when using these parameters in TLS, and show that the …
Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes …
Ph.D. defense of me' thesis entitled "Post-Quantum TLS".
The ubiquitous use of smartphones has contributed to more and more users conducting their online browsing activities through apps, rather than web browsers. In order to provide a …
Conference presentation of our paper
Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined …
Conference talk about our publication KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems at SPACE 2022
We investigate the performance of KEMTLS and PQ instantiations of TLS 1.3 on embedded devices.
We investigate the performance of post-quantum TLS and KEMTLS clients in WolfSSL on embedded systems
Conference presentation of our KEMTLS formal analysis paper at ESORICS 2022