• Publications
  • Influence
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
TLDR
Despite conventional wisdom that generic lattices might be too slow and unwieldy, it is demonstrated that LWE-based key exchange is quite practical: the authors' constant time implementation requires around 1.3ms computation time for each party; compared to the recent NewHope R-LWE scheme, communication sizes increase by a factor of 4.7x, but remain under 12 KiB in each direction.
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
TLDR
This work demonstrates the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, and accompanies these cipher suites with a rigorous proof of security.
A Formal Security Analysis of the Signal Messaging Protocol
TLDR
This work extracts from the implementation a formal description of the abstract protocol, and defines a security model which can capture the "ratcheting" key update structure, and proves the security of Signal's core in this model, demonstrating several standard security properties.
An End-to-End Systems Approach to Elliptic Curve Cryptography
TLDR
A programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m) and delivers optimized performance for a set of commonly used curves through hard-wired reduction logic.
Performance analysis of elliptic curve cryptography for SSL
TLDR
This paper presents a first estimate of the performance improvements that can be expected in SSL (Secure Socket Layer), the dominant security protocol on the Web today, by adding ECC support.
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
TLDR
A cryptographic analysis of the primary ephemeral Diffie-Hellman-based handshake protocol of both TLS 1.3 candidates, which shows that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare-Rogaway model.
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project
TLDR
The Open Quantum Safe project is introduced, an open-source software project for prototyping quantum-resistant cryptography, which includes liboqs, a C library of quantum- resistant algorithms, and the integrations of liboq into popular open- source applications and protocols, including the widely used OpenSSL library.
Modelling after-the-fact leakage for key exchange
TLDR
This work proposes a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys, and introduces a new concept: the leakage-resilient NAXOS trick.
An Analysis of TLS Handshake Proxying
TLDR
This work examines the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service.
...
...