Post-quantum Cryptography
With the imminent arrival of quantum computers, these will break classical cryptography algorithms and allow to retroactively decrypt any encrypted traffic recorded now.
This project is focused on migrating classical algorithms to post-quantum ones and setting up large scale Post-quantum cryptography experiments in real settings.
Publications
2024X-Wing: The Hybrid KEM You've Been Looking For
IACR Communications in Cryptology (Volume: 1, Issue: 1, March 2024).
  Manuel Barbosa,
  Deirdre Connolly,
  João Diogo Duarte,
  Aaron Kaiser,
  Peter Schwabe,
  Karolin Varner,
  Bas Westerbaan
  2022A tale of two models: Formal verification of KEMTLS via Tamarin
27th European Symposium on Research in Computer Security (ESORICS) 2022, Denmark. 2022.
  Sofía Celi,
  Jonathan Hoyland,
  Douglas Stebila,
  Thom Wiggers
  2021Implementing and measuring KEMTLS
Progress in Cryptology – LATINCRYPT 2021, Lecture Notes in Computer Science(), vol 12912. Springer, 2021.
  Sofía Celi,
  Armando Faz-Hernandez,
  Nick Sullivan,
  Goutam Tamvada,
  Luke Valenta,
  Thom Wiggers,
  Bas Westerbaan,
  Christopher A. Wood
  2019Measuring TLS key exchange with post-quantum KEM
Workshop Record of the Second PQC Standardization Conference. 2019.
  Krzysztof Kwiatkowski,
  Nick Sullivan,
  Adam Langley,
  Dave Levin,
  Alan Mislove
  Blog posts
- Defending against future threats: Cloudflare goes post-quantum
 - Introducing post-quantum Cloudflare Tunnel
 - Hertzbleed explained
 - NIST’s pleasant post-quantum surprise
 - Making protocols post-quantum
 - Deep dive into a post-quantum signature scheme
 - Deep dive into a post-quantum key encapsulation algorithm
 - The quantum solace and spectre
 - The post-quantum state: a taxonomy of challenges
 - Sizing Up Post-Quantum Signatures
 - KEMTLS: Post-quantum TLS without signatures
 - Securing the post-quantum world
 - The TLS Post-Quantum Experiment
 - The Quantum Menace
 
Nick
  
Armando
  
Bas
  
Luke
  
Jonathan
  
Goutam
  
Thom
  
Yingchen
  
Josh