{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:53:51Z","timestamp":1776783231711,"version":"3.51.2"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030442224","type":"print"},{"value":"9783030442231","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44223-1_5","type":"book-chapter","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:04:06Z","timestamp":1586473446000},"page":"72-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["Benchmarking Post-quantum Cryptography in TLS"],"prefix":"10.1007","author":[{"given":"Christian","family":"Paquin","sequence":"first","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]},{"given":"Goutam","family":"Tamvada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"key":"5_CR1","unstructured":"Amazon Web Services. s2n (2014). \nhttps:\/\/github.com\/awslabs\/s2n"},{"key":"5_CR2","unstructured":"Apache Software Foundation. ab - Apache HTTP server benchmarking tool (2019). \nhttps:\/\/httpd.apache.org\/docs\/current\/programs\/ab.html"},{"key":"5_CR3","unstructured":"Biederman, E.W.: IP-NETNS(8), January 2013. \nhttp:\/\/man7.org\/linux\/man-pages\/man8\/ip-netns.8.html"},{"key":"5_CR4","unstructured":"Biederman, E.W., Posp\u00ed\u0161ek, T.: VETH(4), February 2018. \nhttp:\/\/man7.org\/linux\/man-pages\/man4\/veth.4.html"},{"key":"5_CR5","unstructured":"Bindel, N., et al.: qTESLA. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Bos, J.W., et al.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) ACM CCS 2016, pp. 1006\u20131018. ACM Press, October 2016. \nhttps:\/\/doi.org\/10.1145\/2976749.2978425","DOI":"10.1145\/2976749.2978425"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE Symposium on Security and Privacy, pp. 553\u2013570. IEEE Computer Society Press, May 2015. \nhttps:\/\/doi.org\/10.1109\/SP.2015.40","DOI":"10.1109\/SP.2015.40"},{"key":"5_CR8","unstructured":"Braithwaite, M.: Experimenting with post-quantum cryptography, July 2016. \nhttps:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html"},{"key":"5_CR9","unstructured":"Campagna, M., Crockett, E.: Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet-Draft draft-campagna-tls-bike-sike-hybrid-01, Internet Engineering Task Force, May 2019. Work in Progress. \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-campagna-tls-bike-sike-hybrid-01"},{"key":"5_CR10","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In: NIST 2nd Post-Quantum Cryptography Standardization Conference 2019, August 2019"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Dowling, B., Fischlin, M., G\u00fcnther, F., Stebila, D.: A cryptographic analysis of the TLS 1.3 handshake protocol candidates. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015, pp. 1197\u20131210. ACM Press, October 2015. \nhttps:\/\/doi.org\/10.1145\/2810103.2813653","DOI":"10.1145\/2810103.2813653"},{"key":"5_CR12","unstructured":"http archive. Page weight, Novober 2019. \nhttps:\/\/httparchive.org\/reports\/page-weight"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-32009-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"T Jager","year":"2012","unstructured":"Jager, T., Kohlar, F., Sch\u00e4ge, S., Schwenk, J.: On the security of TLS-DHE in the standard model. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 273\u2013293. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-32009-5_17"},{"key":"5_CR14","unstructured":"Jao, D., et al.: SIKE. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"},{"key":"5_CR15","unstructured":"Kampanakis, P., Sikeridis, D.: Two post-quantum signature use-cases: Non-issues, challenges and potential solutions. Cryptology ePrint Archive, Report 2019\/1276 (2019). \nhttps:\/\/eprint.iacr.org\/2019\/1276"},{"key":"5_CR16","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stebila, D., Wiggers, T.: The PQClean project, November 2019. \nhttps:\/\/github.com\/PQClean\/PQClean"},{"key":"5_CR17","unstructured":"Kiefer, F., Kwiatkowski, K.: Hybrid ECDHE-SIDH key exchange for TLS. Internet-Draft draft-kiefer-tls-ecdhe-sidh-00, Internet Engineering Task Force, November 2018. Work in Progress. \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-kiefer-tls-ecdhe-sidh-00"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-40041-4_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"H Krawczyk","year":"2013","unstructured":"Krawczyk, H., Paterson, K.G., Wee, H.: On the security of the TLS protocol: a systematic analysis. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 429\u2013448. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40041-4_24"},{"key":"5_CR19","unstructured":"Kwiatkowski, K., Langley, A., Sullivan, N., Levin, D., Mislove, A., Valenta, L.: Measuring TLS key exchange with post-quantum KEM. In: NIST 2nd Post-Quantum Cryptography Standardization Conference 2019, Auguest 2019"},{"key":"5_CR20","unstructured":"Langley, A.: CECPQ2, December 2018. \nhttps:\/\/www.imperialviolet.org\/2018\/12\/12\/cecpq2.html"},{"key":"5_CR21","unstructured":"Langley, A.: Post-quantum confidentiality for TLS, April 2018. \nhttps:\/\/www.imperialviolet.org\/2018\/04\/11\/pqconftls.html"},{"key":"5_CR22","unstructured":"Langley, A.: Real-world measurements of structured-lattices and supersingular isogenies in TLS, October 2019. \nhttps:\/\/www.imperialviolet.org\/2019\/10\/30\/pqsivssl.html"},{"key":"5_CR23","unstructured":"Lantz, B., Heller, B., Handigol, N., Jeyakumar, V., O\u2019Connor, B., Burkard, C.: Mininet, November 2019. \nhttp:\/\/mininet.org\/"},{"key":"5_CR24","unstructured":"Ludovici, F., Pfeifer, H.P.: NETEM(4), November 2011. \nhttp:\/\/man7.org\/linux\/man-pages\/man8\/tc-netem.8.html"},{"key":"5_CR25","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"},{"key":"5_CR26","unstructured":"Mozilla. Telemetry portal, February 2020. \nhttps:\/\/telemetry.mozilla.org\/"},{"key":"5_CR27","unstructured":"Naehrig, M., et al.: FrodoKEM. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"},{"key":"5_CR28","unstructured":"NGINX, Inc.: NGINX | High Performance Load Balancer, Web Server, & Reverse Proxy (2019). \nhttps:\/\/www.nginx.com\/"},{"key":"5_CR29","unstructured":"Open Quantum Safe Project. Open Quantum Safe, November 2019. \nhttps:\/\/openquantumsafe.org\/"},{"key":"5_CR30","unstructured":"Open Quantum Safe Project. OQS-OpenSSL\\_1\\_0\\_2-stable, November 2019. \nhttps:\/\/github.com\/open-quantum-safe\/openssl\/tree\/OQS-OpenSSL_1_0_2-stable"},{"key":"5_CR31","unstructured":"Open Quantum Safe Project. OQS-OpenSSL\\_1\\_1\\_1-stable, November 2019. \nhttps:\/\/github.com\/open-quantum-safe\/openssl\/tree\/OQS-OpenSSL_1_1_1-stable"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) protocol version 1.3. RFC 8446, August 2018. \nhttps:\/\/rfc-editor.org\/rfc\/rfc8446.txt","DOI":"10.17487\/RFC8446"},{"key":"5_CR33","unstructured":"Schanck, J.M., Stebila, D.: A Transport Layer Security (TLS) extension for establishing an additional shared secret. Internet-Draft draft-schanck-tls-additional-keyshare-00, Internet Engineering Task Force, April 2017. Work in Progress. \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-schanck-tls-additional-keyshare-00"},{"key":"5_CR34","unstructured":"Schanck, J.M., Whyte, W., Zhang, Z.: Quantum-safe hybrid (QSH) ciphersuite for Transport Layer Security (TLS) version 1.2. Internet-Draft draft-whyte-qsh-tls12-02, Internet Engineering Task Force, July 2016. Work in Progress.\nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-whyte-qsh-tls12-02"},{"key":"5_CR35","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"},{"key":"5_CR36","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. Cryptology ePrint Archive, Report 2020\/071 (2020). \nhttps:\/\/eprint.iacr.org\/2020\/071"},{"key":"5_CR37","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01, Internet Engineering Task Force, July 2019. Work in Progress. \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-stebila-tls-hybrid-design-01"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-69453-5_2","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Stebila","year":"2017","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the Open Quantum Safe project. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 14\u201337. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-69453-5_2"},{"key":"5_CR39","unstructured":"The Ethernet Alliance. Ethernet jumbo frames, November 2009. \nhttp:\/\/ethernetalliance.org\/wp-content\/uploads\/2011\/10\/EA-Ethernet-Jumbo-Frames-v0-1.pdf"},{"key":"5_CR40","unstructured":"Unger, N., Goldberg, I.: Qatar University, and the Qatar Foundation for Education, Science and Community Development. Netmirage, November 2019. \nhttps:\/\/crysp.uwaterloo.ca\/software\/netmirage\/"},{"key":"5_CR41","unstructured":"Whyte, W., Zhang, Z., Fluhrer, S., Garcia-Morchon, O.: Quantum-safe hybrid (QSH) key exchange for Transport Layer Security (TLS) version 1.3. Internet-Draft draft-whyte-qsh-tls13-06, Internet Engineering Task Force, October 2017. Work in Progress. \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-whyte-qsh-tls13-06"},{"key":"5_CR42","unstructured":"Zaverucha, G., et al.: Picnic. Technical report, National Institute of Standards and Technology (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44223-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:13:19Z","timestamp":1586473999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44223-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030442224","9783030442231"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2020.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"86","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}