Daniel Herzinger
YOU?
Author Swipe
Time-Based State-Management of Hash-Based Signature CAs for VPN-Authentication Open
Advances in quantum computing necessitate migrating the entire technology stack to post-quantum cryptography. This includes IPsec-based VPN connection authentication. Although there is an RFC draft for post-quantum authentication in this s…
Toward a Common Understanding of Cryptographic Agility -- A Systematic Review Open
Cryptographic agility is gaining attention due to its crucial role in maintaining cryptographic security in a rapidly evolving technological landscape. However, despite its increasing importance, the term cryptographic agility remains vagu…
On the Formalization of Cryptographic Migration Open
We present a novel approach to gaining insight into the structure of cryptographic migration problems which are classic problems in applied cryptography. We use a formal model to capture the inherent dependencies and complexities of such t…
Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review Open
Networks such as the Internet are essential for our connected world. Quantum computing poses a threat to this heterogeneous infrastructure since it threatens fundamental security mechanisms. Therefore, a migration to post-quantum-cryptogra…