{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T16:31:22Z","timestamp":1775233882069,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:00:00Z","timestamp":1606089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,23]]},"DOI":"10.1145\/3386367.3431305","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T22:53:05Z","timestamp":1606258385000},"page":"149-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH"],"prefix":"10.1145","author":[{"given":"Dimitrios","family":"Sikeridis","sequence":"first","affiliation":[{"name":"The University of New Mexico"}]},{"given":"Panos","family":"Kampanakis","sequence":"additional","affiliation":[{"name":"Cisco Systems"}]},{"given":"Michael","family":"Devetsikiotis","sequence":"additional","affiliation":[{"name":"The University of New Mexico"}]}],"member":"320","published-online":{"date-parts":[[2020,11,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978364"},{"key":"e_1_3_2_2_2_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 327--343.","author":"Alkim Erdem"},{"key":"e_1_3_2_2_3_1","volume-title":"The Elliptic Curve Key Agreement and Key Transport Protocols. (September","author":"ANSI.","year":"1999"},{"key":"e_1_3_2_2_4_1","volume-title":"Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). (September","author":"ANSI.","year":"2005"},{"key":"e_1_3_2_2_5_1","unstructured":"Jean-Philippe Aumasson Daniel J Bernstein Christoph Dobraunig Maria Eichlseder Scott Fluhrer Stefan-Lukas Gazdag Andreas H\u00fclsing Panos Kampanakis Stefan K\u00f6lbl Tanja Lange etal 2019. SPHINCS+ - Submission to the 2nd round of the NIST post-quantum project. https:\/\/sphincs.org\/data\/sphincs+-round2-specification.pdf. (2019). Specification document (part of the submission package).  Jean-Philippe Aumasson Daniel J Bernstein Christoph Dobraunig Maria Eichlseder Scott Fluhrer Stefan-Lukas Gazdag Andreas H\u00fclsing Panos Kampanakis Stefan K\u00f6lbl Tanja Lange et al. 2019. SPHINCS+ - Submission to the 2nd round of the NIST post-quantum project. https:\/\/sphincs.org\/data\/sphincs+-round2-specification.pdf. (2019). Specification document (part of the submission package)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5280"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.40"},{"key":"e_1_3_2_2_9_1","volume-title":"The New Codebreakers","author":"Buchmann Johannes A"},{"key":"e_1_3_2_2_10_1","volume-title":"Post-Quantum TLS on Embedded Systems. ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020","author":"B\u00fcrstinghaus-Steinbach Kevin","year":"2020"},{"key":"e_1_3_2_2_11_1","volume-title":"Hybrid-Key Exchanges as an Interim-to-Permanent Solution to Cryptographic Agility. (June","author":"Campagna Matt","year":"2019"},{"key":"e_1_3_2_2_12_1","volume-title":"IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 208--213","author":"Fontugne Romain","year":"2018"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6928"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1773--1788","author":"Cremers Cas"},{"key":"e_1_3_2_2_15_1","volume-title":"Resumption and Delayed Authentication. 2016 IEEE Symposium on Security and Privacy (SP)","author":"Cremers Cas J. F.","year":"2016"},{"key":"e_1_3_2_2_16_1","volume-title":"NIST 2nd Post-Quantum Cryptography Standardization Conference","author":"Crockett Eric","year":"2019"},{"key":"e_1_3_2_2_17_1","volume-title":"Rainbow - Algorithm Specification and Documentation. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions. (2019). The 2nd Round Proposal","author":"Ding Jintai"},{"key":"e_1_3_2_2_18_1","unstructured":"L\u00e9o Ducas Eike Kiltz Tancrede Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2018. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. https:\/\/pq-crystals.org\/dilithium\/resources.shtml. (2018). Submission to round 2 of the NIST post-quantum project.  L\u00e9o Ducas Eike Kiltz Tancrede Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2018. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. https:\/\/pq-crystals.org\/dilithium\/resources.shtml. (2018). Submission to round 2 of the NIST post-quantum project."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1823844.1823848"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3742"},{"key":"e_1_3_2_2_21_1","unstructured":"Scott Fluhrer David McGrew Panos Kampanakis and Valery Smyslov. 2019. Postquantum Preshared Keys for IKEv2. Internet-Draft draft-ietf-ipsecme-qr-ikev2-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ipsecme-qr-ikev2-08 Work in Progress.  Scott Fluhrer David McGrew Panos Kampanakis and Valery Smyslov. 2019. Postquantum Preshared Keys for IKEv2. Internet-Draft draft-ietf-ipsecme-qr-ikev2-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ipsecme-qr-ikev2-08 Work in Progress."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838249"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Alessandro Ghedini and Victor Vasiliev. 2020. TLS Certificate Compression. Internet-Draft draft-ietf-tls-certificate-compression-10. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-certificate-compression-10 Work in Progress.  Alessandro Ghedini and Victor Vasiliev. 2020. TLS Certificate Compression. Internet-Draft draft-ietf-tls-certificate-compression-10. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-certificate-compression-10 Work in Progress.","DOI":"10.17487\/RFC8879"},{"key":"e_1_3_2_2_24_1","unstructured":"Google. 2020. Google Transparency Report - HTTPS encryption on the web. https:\/\/transparencyreport.google.com\/https\/overview. (2020). Web page. Accessed 2020-06-19.  Google. 2020. Google Transparency Report - HTTPS encryption on the web. https:\/\/transparencyreport.google.com\/https\/overview. (2020). Web page. Accessed 2020-06-19."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3207"},{"key":"e_1_3_2_2_26_1","unstructured":"Paul E. Hoffman. 2019. The Transition from Classical to Post-Quantum Cryptography. Internet-Draft draft-hoffman-c2pq-05. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-hoffman-c2pq-05 Work in Progress.  Paul E. Hoffman. 2019. The Transition from Classical to Post-Quantum Cryptography. Internet-Draft draft-hoffman-c2pq-05. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-hoffman-c2pq-05 Work in Progress."},{"key":"e_1_3_2_2_27_1","volume-title":"NIST submissions","author":"H\u00fclsing Andreas","year":"2017"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_2_31_1","unstructured":"Kris Kwiatkowski. 2019. Towards Post-Quantum Cryptography in TLS. (2019). https:\/\/blog.cloudflare.com\/towards-post-quantum-cryptography-in-tls\/  Kris Kwiatkowski. 2019. Towards Post-Quantum Cryptography in TLS. (2019). https:\/\/blog.cloudflare.com\/towards-post-quantum-cryptography-in-tls\/"},{"key":"e_1_3_2_2_32_1","unstructured":"Kris Kwiatkowski and Luke Valenta. 2019. The TLS Post-Quantum Experiment. (2019). https:\/\/blog.cloudflare.com\/the-tls-post-quantum-experiment\/.  Kris Kwiatkowski and Luke Valenta. 2019. The TLS Post-Quantum Experiment. (2019). https:\/\/blog.cloudflare.com\/the-tls-post-quantum-experiment\/."},{"key":"e_1_3_2_2_33_1","unstructured":"Adam Langley. 2016. CECPQ1 results. (2016). https:\/\/www.imperialviolet.org\/2016\/11\/28\/cecpq1.html  Adam Langley. 2016. CECPQ1 results. (2016). https:\/\/www.imperialviolet.org\/2016\/11\/28\/cecpq1.html"},{"key":"e_1_3_2_2_34_1","volume-title":"https:\/\/www.imperialviolet.org\/2018\/12\/12\/cecpq2.html","author":"Langley Adam","year":"2018"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4252"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4254"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4253"},{"key":"e_1_3_2_2_38_1","volume-title":"Request for Comments 8017","author":"Moriarty Kathleen","year":"2016"},{"key":"e_1_3_2_2_39_1","unstructured":"Mozilla. 2018. Mozilla Telemetry Portal - Measurement Dashboard - HTTP_PAGE_TLS_HANDSHAKE distribution for Firefox Desktop. https:\/\/telemetry.mozilla.org\/new-pipeline\/dist.html. (2018). Beta 68\/69 any OS any architecture any process. Web page. Accessed 2019-21-08.  Mozilla. 2018. Mozilla Telemetry Portal - Measurement Dashboard - HTTP_PAGE_TLS_HANDSHAKE distribution for Firefox Desktop. https:\/\/telemetry.mozilla.org\/new-pipeline\/dist.html. (2018). Beta 68\/69 any OS any architecture any process. Web page. Accessed 2019-21-08."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"e_1_3_2_2_42_1","unstructured":"NIST. 2020. Post-Quantum Cryptography Round 2 Submissions. (2020). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-2-submissions.  NIST. 2020. Post-Quantum Cryptography Round 2 Submissions. (2020). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-2-submissions."},{"key":"e_1_3_2_2_43_1","first-page":"180","article-title":"Specification for the Secure Hash Standard","author":"National Institute of Standards and Technology.","year":"2002","journal-title":"Federal Information Professing Standards (FIPS)"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"e_1_3_2_2_45_1","unstructured":"OQS Project. 2020. liboqs. https:\/\/github.com\/open-quantum-safe\/liboqs. (2020). Web page. Accessed 2020-02-06.  OQS Project. 2020. liboqs. https:\/\/github.com\/open-quantum-safe\/liboqs. (2020). Web page. Accessed 2020-02-06."},{"key":"e_1_3_2_2_46_1","unstructured":"OQS Project. 2020. OQS OpenSSH. https:\/\/github.com\/open-quantum-safe\/openssh. (2020). Web page. Accessed 2020-02-06.  OQS Project. 2020. OQS OpenSSH. https:\/\/github.com\/open-quantum-safe\/openssh. (2020). Web page. Accessed 2020-02-06."},{"key":"e_1_3_2_2_47_1","unstructured":"OQS Project. 2020. OQS OpenSSL. https:\/\/github.com\/open-quantum-safe\/openssl. (2020). Web page. Accessed 2020-02-06.  OQS Project. 2020. OQS OpenSSL. https:\/\/github.com\/open-quantum-safe\/openssl. (2020). Web page. Accessed 2020-02-06."},{"key":"e_1_3_2_2_48_1","unstructured":"PQClean Project. 2019. PQClean. https:\/\/github.com\/PQClean\/PQClean. (2019). Web page. Accessed 2019-02-09.  PQClean Project. 2019. PQClean. https:\/\/github.com\/PQClean\/PQClean. (2019). Web page. Accessed 2019-02-09."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_2_51_1","unstructured":"Eric Rescorla Richard Barnes and Hannes Tschofenig. 2020. Compact TLS 1.3. Internet-Draft draft-rescorla-tls-ctls-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-rescorla-tls-ctls-04 Work in Progress.  Eric Rescorla Richard Barnes and Hannes Tschofenig. 2020. Compact TLS 1.3. Internet-Draft draft-rescorla-tls-ctls-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-rescorla-tls-ctls-04 Work in Progress."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131370"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506549"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00012"},{"key":"e_1_3_2_2_55_1","unstructured":"SHODAN. 2019. HTTPS (443) Overview. (July 2019). https:\/\/www.shodan.io\/report\/nWlAWhKG.  SHODAN. 2019. HTTPS (443) Overview. (July 2019). https:\/\/www.shodan.io\/report\/nWlAWhKG."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"e_1_3_2_2_58_1","volume-title":"Bhaskar Prasad Rimal, and Michael Devetsikiotis","author":"Sikeridis Dimitrios","year":"2017"},{"key":"e_1_3_2_2_60_1","unstructured":"Douglas Steblia Scott Fluhrer and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-stebila-tls-hybrid-design-01 Work in Progress.  Douglas Steblia Scott Fluhrer and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-stebila-tls-hybrid-design-01 Work in Progress."},{"key":"e_1_3_2_2_61_1","unstructured":"Douglas Steblia Scott Fluhrer and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-stebila-tls-hybrid-design-01 Work in Progress.  Douglas Steblia Scott Fluhrer and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-stebila-tls-hybrid-design-01 Work in Progress."},{"key":"e_1_3_2_2_62_1","volume-title":"ECDSA: The digital signature algorithm of a better internet. https:\/\/blog.cloudflare.com\/ecdsa-the-digital-signature-algorithm-of-a-better-internet\/. CloudFlare","author":"Sullivan Nick","year":"2014"},{"key":"e_1_3_2_2_63_1","unstructured":"Martin Thomson. 2019. Suppressing Intermediate Certificates in TLS. Internet-Draft draft-thomson-tls-sic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-thomson-tls-sic-00 Work in Progress.  Martin Thomson. 2019. Suppressing Intermediate Certificates in TLS. Internet-Draft draft-thomson-tls-sic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-thomson-tls-sic-00 Work in Progress."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00034"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6818"}],"event":{"name":"CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies","location":"Barcelona Spain","acronym":"CoNEXT '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386367.3431305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386367.3431305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:04Z","timestamp":1750195924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386367.3431305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,23]]},"references-count":62,"alternative-id":["10.1145\/3386367.3431305","10.1145\/3386367"],"URL":"https:\/\/doi.org\/10.1145\/3386367.3431305","relation":{},"subject":[],"published":{"date-parts":[[2020,11,23]]},"assertion":[{"value":"2020-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}