{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:07:51Z","timestamp":1774721271753,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030882372","type":"print"},{"value":"9783030882389","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88238-9_5","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T08:17:47Z","timestamp":1632903467000},"page":"88-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Implementing and Measuring KEMTLS"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3333-7764","authenticated-orcid":false,"given":"Sof\u00eda","family":"Celi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5502-8666","authenticated-orcid":false,"given":"Armando","family":"Faz-Hern\u00e1ndez","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Sullivan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5784-1658","authenticated-orcid":false,"given":"Goutam","family":"Tamvada","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8936-0499","authenticated-orcid":false,"given":"Luke","family":"Valenta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8967-8456","authenticated-orcid":false,"given":"Thom","family":"Wiggers","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3195-6238","authenticated-orcid":false,"given":"Bas","family":"Westerbaan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3297-4216","authenticated-orcid":false,"given":"Christopher A.","family":"Wood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 5\u201317. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813707","DOI":"10.1145\/2810103.2813707"},{"key":"5_CR2","unstructured":"Arai, K., Matsuo, S.: Formal verification of TLS 1.3 full handshake protocol using proverif (Draft-11). IETF TLS mailing list (2016). https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/NXGYUUXCD2b9WwBRWbvrccjjdyI"},{"key":"5_CR3","unstructured":"Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 689\u2013706. USENIX Association, Austin, August 2016. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/aviram"},{"key":"5_CR4","unstructured":"Barnes, R., Iyengar, S., Sullivan, N., Rescorla, E.: Delegated credentials for TLS. Internet-Draft draft-ietf-tls-subcerts-10, Internet Engineering Task Force, January 2021. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-subcerts-10. Work in Progress"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Beurdouche, B., et al.: A messy state of the union: taming the composite state machines of TLS. In: 2015 IEEE Symposium on Security and Privacy, pp. 535\u2013552 (2015). https:\/\/doi.org\/10.1109\/SP.2015.39","DOI":"10.1109\/SP.2015.39"},{"key":"5_CR7","unstructured":"Braithwaite, M.: Experimenting with post-quantum cryptography. Google Security Blog, Google Online Security, July 2016. https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html. Accessed 16 Feb 2021"},{"key":"5_CR8","unstructured":"Campagna, M., Crockett, E.: Hybrid post-quantum key encapsulation methods (PQ KEM) for transport layer security 1.2 (TLS). Internet-Draft draft-campagna-tls-bike-sike-hybrid-06, Internet Engineering Task Force, March 2021. https:\/\/datatracker.ietf.org\/doc\/html\/draft-campagna-tls-bike-sike-hybrid-06. Work in Progress"},{"key":"5_CR9","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In: Second PQC Standardization Conference, University of California, Santa Barbara, August 2019. https:\/\/csrc.nist.gov\/Presentations\/2019\/prototyping-post-quantum-and-hybrid-key-exchange"},{"key":"5_CR10","unstructured":"Faz-Hern\u00e1ndez, A., Kwiatkowski, K.: Introducing CIRCL: An Advanced Cryptographic Library. Cloudflare, Inc, June 2019. https:\/\/blog.cloudflare.com\/introducing-circl\/. Accessed Feb 2021"},{"key":"5_CR11","unstructured":"Feman, R.C., Willis, T.: Securing the web, together. Google Security Blog, March 2016. https:\/\/security.googleblog.com\/2016\/03\/securing-web-together_15.html. Accessed 16 May 2021"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Ghedini, A., Vasiliev, V.: TLS Certificate Compression. RFC 7924, RFC Editor, December 2020. https:\/\/doi.org\/10.17487\/RFC8879","DOI":"10.17487\/RFC8879"},{"key":"5_CR13","unstructured":"Hoyland, J., Wood, C.: TLS 1.3 extended key schedule. Internet-Draft draft-jhoyla-tls-extended-key-schedule-03, Internet Engineering Task Force, December 2020. https:\/\/datatracker.ietf.org\/doc\/html\/draft-jhoyla-tls-extended-key-schedule-03. Work in Progress"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-319-66787-4_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"A H\u00fclsing","year":"2017","unstructured":"H\u00fclsing, A., Rijneveld, J., Schanck, J., Schwabe, P.: High-speed key encapsulation from NTRU. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 232\u2013252. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_12"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Iyengar, J., Thomson, M.: QUIC: A UDP-Based Multiplexed and Secure Transport. RFC 9000, May 2021. https:\/\/doi.org\/10.17487\/RFC9000","DOI":"10.17487\/RFC9000"},{"key":"5_CR16","unstructured":"Jao, D., et al.: SIKE. Technical report, National Institute of Standards and Technology (2020). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Josefsson, S.: Storing Certificates in the Domain Name System (DNS). RFC 4398, RFC Editor, March 2006. https:\/\/doi.org\/10.17487\/RFC4398","DOI":"10.17487\/RFC4398"},{"key":"5_CR18","unstructured":"Kampanakis, P., Sikeridis, D.: Two post-quantum signature use-cases: non-issues, challenges and potential solutions. In: 7th ETSI\/IQC Quantum Safe Cryptography Workshop 2019, November 2019. https:\/\/eprint.iacr.org\/2019\/1276"},{"key":"5_CR19","unstructured":"Kiefer, F., Kwiatkowski, K.: Hybrid ECDHE-SIDH Key Exchange for TLS. Internet-Draft draft-kiefer-tls-ecdhe-sidh-00, Internet Engineering Task Force, May 2019. https:\/\/datatracker.ietf.org\/doc\/html\/draft-kiefer-tls-ecdhe-sidh-00. Work in Progress"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Kumar, D., et al.: Security challenges in an increasingly tangled web. In: Barrett, R., Cummings, R., Agichtein, E., Gabrilovich, E. (eds.) Proceedings of the 26th International Conference on World Wide Web, WWW 2017, Perth, Australia, 3\u20137 April 2017, pp. 677\u2013684. ACM (2017). https:\/\/doi.org\/10.1145\/3038912.3052686","DOI":"10.1145\/3038912.3052686"},{"key":"5_CR21","unstructured":"Kwiatkowski, K., Langley, A., Sullivan, N., Levin, D., Mislove, A., Valenta, L.: Measuring TLS key exchange with post-quantum KEM. University of California, Santa Barbara, August 2019. https:\/\/csrc.nist.gov\/Presentations\/2019\/measuring-tls-key-exchange-with-post-quantum-kem"},{"key":"5_CR22","unstructured":"Lamik, M.: Introducing Cloudflare Radar. The Cloudflare Blog, September 2020. https:\/\/blog.cloudflare.com\/introducing-cloudflare-radar. Accessed 16 May 2021"},{"key":"5_CR23","unstructured":"Langley, A.: CECPQ2. ImperialViolet, December 2018. https:\/\/www.imperialviolet.org\/2018\/12\/12\/cecpq2.html. Accessed 16 Feb 2021"},{"key":"5_CR24","unstructured":"Langley, A.: Real-world measurements of structured-lattices and supersingular isogenies in TLS. ImperialViolet, October 2019. https:\/\/www.imperialviolet.org\/2019\/10\/30\/pqsivssl.html. Accessed 16 Feb 2021"},{"key":"5_CR25","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2020). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"5_CR26","unstructured":"Marculescu, M.: Introducing gRPC, a new open source HTTP\/2 RPC framework. Google Developers, February 2015. https:\/\/developers.googleblog.com\/2015\/02\/introducing-grpc-new-open-source-http2.html"},{"key":"5_CR27","unstructured":"National Institute of Standards and Technology: Post-Quantum Cryptography Standardization, January 2017. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization. Accessed 16 May 2021"},{"key":"5_CR28","unstructured":"Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2020). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security TLS Protocol Version 1.3. RFC 8446, RFC Editor, August 2018. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Santesso, S., Tschofenig, H.: Transport Layer Security (TLS) Cached Information Extension. RFC 7924, RFC Editor, July 2016. https:\/\/doi.org\/10.17487\/RFC7924","DOI":"10.17487\/RFC7924"},{"key":"5_CR31","unstructured":"Schanck, J.M., Stebila, D.: A Transport Layer Security (TLS) Extension For Establishing An Additional Shared Secret. Internet-Draft draft-schanck-tls-additional-keyshare-00, Internet Engineering Task Force, April 2017. https:\/\/datatracker.ietf.org\/doc\/html\/draft-schanck-tls-additional-keyshare-00. Work in Progress"},{"key":"5_CR32","unstructured":"Schanck, J.M., Whyte, W., Zhang, Z.: Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.2. Internet-Draft draft-whyte-qsh-tls12-02, Internet Engineering Task Force, January 2017. https:\/\/datatracker.ietf.org\/doc\/html\/draft-whyte-qsh-tls12-02. Work in Progress"},{"key":"5_CR33","doi-asserted-by":"publisher","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020: 27th Conference on Computer and Communications Security, pp. 1461\u20131480. ACM Press, Virtual Event, 9\u201313 November 2020. https:\/\/doi.org\/10.1145\/3372297.3423350","DOI":"10.1145\/3372297.3423350"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: More efficient post-quantum KEMTLS with pre-distributed public keys (2021). https:\/\/eprint.iacr.org\/2021\/779","DOI":"10.1007\/978-3-030-88418-5_1"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. In: ISOC Network and Distributed System Security Symposium - NDSS 2020. The Internet Society, San Diego, 23\u201326 February 2020","DOI":"10.14722\/ndss.2020.24203"},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-69453-5_2","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Stebila","year":"2017","unstructured":"Stebila, D., Mosca, M.: Post-quantum Key exchange for the internet and the open quantum safe project. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 14\u201337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_2"},{"key":"5_CR37","unstructured":"Steblia, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-03, Internet Engineering Task Force, April 2021. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-hybrid-design-03. Work in Progress"},{"key":"5_CR38","unstructured":"Sullivan, N.: Why TLS 1.3 isn\u2019t in browsers yet. The Cloudflare Blog, December 2017. https:\/\/blog.cloudflare.com\/why-tls-1-3-isnt-in-browsers-yet\/. Accessed 15 April 2021"},{"key":"5_CR39","unstructured":"Sullivan, N.: A detailed look at RFC 8446 (a.k.a. TLS 1.3). The Cloudflare Blog, August 2018. https:\/\/blog.cloudflare.com\/rfc-8446-aka-tls-1-3\/. Accessed 16 February 2021"},{"key":"5_CR40","doi-asserted-by":"publisher","unstructured":"Syta, E., et al.: Scalable bias-resistant distributed randomness. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 444\u2013460 (2017). https:\/\/doi.org\/10.1109\/SP.2017.45. https:\/\/drand.love","DOI":"10.1109\/SP.2017.45"},{"key":"5_CR41","unstructured":"Thomson, M.: Suppressing intermediate certificates in TLS. Internet-Draft draft-thomson-tls-sic-00, Internet Engineering Task Force, March 2019. https:\/\/datatracker.ietf.org\/doc\/html\/draft-thomson-tls-sic-00. Work in Progress"},{"key":"5_CR42","unstructured":"Whyte, W., Zhang, Z., Fluhrer, S., Garcia-Morchon, O.: Quantum-Safe Hybrid (QSH) Key Exchange for Transport Layer Security (TLS) version 1.3. Internet-Draft draft-whyte-qsh-tls13-06, Internet Engineering Task Force, October 2017. https:\/\/datatracker.ietf.org\/doc\/html\/draft-whyte-qsh-tls13-06. Work in Progress"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88238-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:14:23Z","timestamp":1710267263000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88238-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030882372","9783030882389"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88238-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bogot\u00e1","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/urosario.edu.co\/Latin-Crypt\/inicio\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}