Thom Wiggers
YOU?
Author Swipe
View article: Optimizations and Practicality of High-Security CSIDH
Optimizations and Practicality of High-Security CSIDH Open
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quan…
View article: Post-Quantum TLS Without Handshake Signatures
Post-Quantum TLS Without Handshake Signatures Open
\n Contains fulltext :\n 225738pre.pdf (Author’s version preprint ) (Open Access)\n \n Contains fulltext :\n 225738pub.pdf (Publisher’s version ) (Open Access)\n
View article: thomwiggers/kemtls-experiment: ACM CCS version
thomwiggers/kemtls-experiment: ACM CCS version Open
Version of the code as of the camera-ready version submitted to ACM CCS 2020
View article: Implementing CAESAR candidate Prøst on ARM11
Implementing CAESAR candidate Prøst on ARM11 Open
Prost was a contestant in the CAESAR competition for Authenticated Encryption. I optimised Prost for the ARM11 microprocessor architecture. By trying to find a provably minimal program for one of the sub-operations, I found a new approach …