{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:48:44Z","timestamp":1769921324018,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG)","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]},{"name":"Dutch Research Council (NWO)","award":["VI.Vidi.193.066"],"award-info":[{"award-number":["VI.Vidi.193.066"]}]},{"name":"European Research Council","award":["805031 (EPOQUE)"],"award-info":[{"award-number":["805031 (EPOQUE)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560577","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"97-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Post Quantum Noise"],"prefix":"10.1145","author":[{"given":"Yawning","family":"Angel","sequence":"first","affiliation":[{"name":"Oasis Labs, San Francisco, CA, USA"}]},{"given":"Benjamin","family":"Dowling","sequence":"additional","affiliation":[{"name":"University of Sheffield, Sheffield, Netherlands"}]},{"given":"Andreas","family":"H\u00fclsing","sequence":"additional","affiliation":[{"name":"TU Eindhoven, Eindhoven, Netherlands"}]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[{"name":"MPI-SP, Bochum, Germany"}]},{"given":"Florian","family":"Weber","sequence":"additional","affiliation":[{"name":"TU Eindhoven, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"277","volume-title":"CSF 2020 Computer Security Foundations Symposium","author":"Akhmetzyanova Liliya R.","year":"2020","unstructured":"Liliya R. Akhmetzyanova , Cas Cremers , Luke Garratt , Stanislav Smyshlyaev , and Nick Sullivan . Limiting the impact of unreliable randomness in deployed security protocols. In Limin Jia and Ralf K\u00fcsters, editors , CSF 2020 Computer Security Foundations Symposium , pages 277 -- 287 . IEEE Computer Society Press , 2020 . Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, and Nick Sullivan. Limiting the impact of unreliable randomness in deployed security protocols. In Limin Jia and Ralf K\u00fcsters, editors, CSF 2020 Computer Security Foundations Symposium, pages 277--287. IEEE Computer Society Press, 2020."},{"key":"e_1_3_2_1_2_1","unstructured":"Yawning Angel. nyquist - a Noise protocol framework implementation. https:\/\/github.com\/Yawning\/nyquist.  Yawning Angel. nyquist - a Noise protocol framework implementation. https:\/\/github.com\/Yawning\/nyquist."},{"key":"e_1_3_2_1_3_1","volume-title":"Paper 2022\/539","author":"Angel Yawning","year":"2022","unstructured":"Yawning Angel , Benjamin Dowling , Andreas H\u00fclsing , Peter Schwabe , and Florian Weber . Post Quantum Noise. Cryptology ePrint Archive , Paper 2022\/539 , 2022 . https:\/\/eprint.iacr.org\/2022\/539. Yawning Angel, Benjamin Dowling, Andreas H\u00fclsing, Peter Schwabe, and Florian Weber. Post Quantum Noise. Cryptology ePrint Archive, Paper 2022\/539, 2022. https:\/\/eprint.iacr.org\/2022\/539."},{"key":"e_1_3_2_1_4_1","unstructured":"Roberto Avanzi Joppe Bos L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. Crystals-kyber (version 3.02) -- submission to round 3 of the nist postquantum project 2021. https:\/\/pq-crystals.org\/kyber\/data\/kyber-specificationround3--20210804.pdf.  Roberto Avanzi Joppe Bos L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. Crystals-kyber (version 3.02) -- submission to round 3 of the nist postquantum project 2021. https:\/\/pq-crystals.org\/kyber\/data\/kyber-specificationround3--20210804.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"Reza Azarderakhsh Matthew Campagna Craig Costello Luca De Feo Basil Hess Aaron Hutchinson Amir Jalali Koray Karabina Brian Koziel Brian LaMacchia Patrick Longa Michael Naehrig Geovandro Pereira Joost Renes Vladimir Soukharev and David Urbanik. Supersingular isogeny key encapsulation. Round-3 submission to the NIST PQC project 2020. https:\/\/sike.org\/#specification.  Reza Azarderakhsh Matthew Campagna Craig Costello Luca De Feo Basil Hess Aaron Hutchinson Amir Jalali Koray Karabina Brian Koziel Brian LaMacchia Patrick Longa Michael Naehrig Geovandro Pereira Joost Renes Vladimir Soukharev and David Urbanik. Supersingular isogeny key encapsulation. Round-3 submission to the NIST PQC project 2020. https:\/\/sike.org\/#specification."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.351-387"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Daniel J.\n      Bernstein\n    .\n  Curve25519: New Diffie-Hellman speed records\n  . In Moti Yung Yevgeniy Dodis Aggelos Kiayias and Tal Malkin editors PKC \n  2006 volume \n  3958\n   of \n  LNCS pages \n  207\n  --\n  228\n  . \n  Springer Heidelberg April 2006.  Daniel J. Bernstein. Curve25519: New Diffie-Hellman speed records. In Moti Yung Yevgeniy Dodis Aggelos Kiayias and Tal Malkin editors PKC 2006 volume 3958 of LNCS pages 207--228. Springer Heidelberg April 2006.","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_8_1","volume-title":"Bernstein and Tanja Lange. eBACS: ECRYPT benchmarking of cryptographic systems. https:\/\/bench.cr.yp.to (accessed","author":"Daniel","year":"2021","unstructured":"Daniel J. Bernstein and Tanja Lange. eBACS: ECRYPT benchmarking of cryptographic systems. https:\/\/bench.cr.yp.to (accessed 29 Sep 2021 ). Daniel J. Bernstein and Tanja Lange. eBACS: ECRYPT benchmarking of cryptographic systems. https:\/\/bench.cr.yp.to (accessed 29 Sep 2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Daniel J.\n      Bernstein Tanja\n      Lange Chloe\n      Martindale and \n      Lorenz\n      Panny\n    .\n  Quantum circuits for the CSIDH: Optimizing quantum evaluation of isogenies\n  . In Yuval Ishai and Vincent Rijmen editors EUROCRYPT \n  2019 Part II volume \n  11477\n   of \n  LNCS pages \n  409\n  --\n  441\n  . \n  Springer Heidelberg May 2019.  Daniel J. Bernstein Tanja Lange Chloe Martindale and Lorenz Panny. Quantum circuits for the CSIDH: Optimizing quantum evaluation of isogenies. In Yuval Ishai and Vincent Rijmen editors EUROCRYPT 2019 Part II volume 11477 of LNCS pages 409--441. Springer Heidelberg May 2019.","DOI":"10.1007\/978-3-030-17656-3_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Xavier\n      Bonnetain\n     and \n      Andr\u00e9\n      Schrottenloher\n    .\n  Quantum security analysis of CSIDH\n  . In Anne Canteaut and Yuval Ishai editors EUROCRYPT \n  2020 Part II volume \n  12106\n   of \n  LNCS pages \n  493\n  --\n  522\n  . \n  Springer Heidelberg May 2020.  Xavier Bonnetain and Andr\u00e9 Schrottenloher. Quantum security analysis of CSIDH. In Anne Canteaut and Yuval Ishai editors EUROCRYPT 2020 Part II volume 12106 of LNCS pages 493--522. Springer Heidelberg May 2020.","DOI":"10.1007\/978-3-030-45724-2_17"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ran\n      Canetti\n     and \n      Hugo\n      Krawczyk\n    .\n  Analysis of key-exchange protocols and their use for building secure channels\n  . In Birgit Pfitzmann editor EUROCRYPT \n  2001 volume \n  2045\n   of \n  LNCS pages \n  453\n  --\n  474\n  . \n  Springer Heidelberg May 2001.  Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Birgit Pfitzmann editor EUROCRYPT 2001 volume 2045 of LNCS pages 453--474. Springer Heidelberg May 2001.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Wouter\n      Castryck Tanja\n      Lange Chloe\n      Martindale Lorenz\n      Panny and \n      Joost\n      Renes\n    .\n  CSIDH: An efficient post-quantum commutative group action\n  . In Thomas Peyrin and Steven Galbraith editors ASIACRYPT \n  2018 Part III volume \n  11274\n   of \n  LNCS pages \n  395\n  --\n  427\n  . \n  Springer Heidelberg December 2018.  Wouter Castryck Tanja Lange Chloe Martindale Lorenz Panny and Joost Renes. CSIDH: An efficient post-quantum commutative group action. In Thomas Peyrin and Steven Galbraith editors ASIACRYPT 2018 Part III volume 11274 of LNCS pages 395--427. Springer Heidelberg December 2018.","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8937"},{"key":"e_1_3_2_1_16_1","volume-title":"May","author":"Debian-Project The","year":"2008","unstructured":"The Debian-Project . Debian Security Advisory -- DSA-1571--1 openssl -- predictable random number generator , May 2008 . https:\/\/www.debian.org\/security\/ 2008\/dsa-1571. The Debian-Project. Debian Security Advisory -- DSA-1571--1 openssl -- predictable random number generator, May 2008. https:\/\/www.debian.org\/security\/ 2008\/dsa-1571."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Benjamin\n      Dowling\n     and \n      Kenneth G.\n      Paterson\n  . \n  A cryptographic analysis of the WireGuard protocol\n  . In Bart Preneel and Frederik Vercauteren editors ACNS 18 volume \n  10892\n   of \n  LNCS pages \n  3\n  --\n  21\n  . \n  Springer Heidelberg July \n  2018\n  .  Benjamin Dowling and Kenneth G. Paterson. A cryptographic analysis of the WireGuard protocol. In Bart Preneel and Frederik Vercauteren editors ACNS 18 volume 10892 of LNCS pages 3--21. Springer Heidelberg July 2018.","DOI":"10.1007\/978-3-319-93387-0_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Benjamin\n      Dowling Paul\n      R\u00f6sler and \n      J\u00f6rg\n      Schwenk\n    .\n  Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework\n  . In Aggelos Kiayias Markulf Kohlweiss Petros Wallden and Vassilis Zikas editors PKC \n  2020 Part I volume \n  12110\n   of \n  LNCS pages \n  341\n  --\n  373\n  . \n  Springer Heidelberg May 2020.  Benjamin Dowling Paul R\u00f6sler and J\u00f6rg Schwenk. Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework. In Aggelos Kiayias Markulf Kohlweiss Petros Wallden and Vassilis Zikas editors PKC 2020 Part I volume 12110 of LNCS pages 341--373. Springer Heidelberg May 2020.","DOI":"10.1007\/978-3-030-45374-9_12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Atsushi\n      Fujioka Koutarou\n      Suzuki Keita\n      Xagawa and \n      Kazuki\n      Yoneyama\n    .\n  Strongly secure authenticated key exchange from factoring codes and lattices\n  . In Marc Fischlin Johannes Buchmann and Mark Manulis editors PKC \n  2012 volume \n  7293\n   of \n  LNCS pages \n  467\n  --\n  484\n  . \n  Springer Heidelberg May 2012.  Atsushi Fujioka Koutarou Suzuki Keita Xagawa and Kazuki Yoneyama. Strongly secure authenticated key exchange from factoring codes and lattices. In Marc Fischlin Johannes Buchmann and Mark Manulis editors PKC 2012 volume 7293 of LNCS pages 467--484. Springer Heidelberg May 2012.","DOI":"10.1007\/978-3-642-30057-8_28"},{"key":"e_1_3_2_1_22_1","first-page":"1857","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Girol Guillaume","year":"2020","unstructured":"Guillaume Girol , Lucca Hirschi , Ralf Sasse , Dennis Jackson , Cas Cremers , and David Basin . A spectral analysis of noise: a comprehensive, automated, formal analysis of diffie-hellman protocols . In 29th {USENIX} Security Symposium ({USENIX} Security 20) , pages 1857 -- 1874 , 2020 . Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin. A spectral analysis of noise: a comprehensive, automated, formal analysis of diffie-hellman protocols. In 29th {USENIX} Security Symposium ({USENIX} Security 20), pages 1857--1874, 2020."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00030"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9248-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00034"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Hugo\n      Krawczyk\n    .\n  HMQV: A high-performance secure Diffie-Hellman protocol\n  . In Victor Shoup editor CRYPTO \n  2005 volume \n  3621\n   of \n  LNCS pages \n  546\n  --\n  566\n  . \n  Springer Heidelberg August 2005.  Hugo Krawczyk. HMQV: A high-performance secure Diffie-Hellman protocol. In Victor Shoup editor CRYPTO 2005 volume 3621 of LNCS pages 546--566. Springer Heidelberg August 2005.","DOI":"10.1007\/11535218_33"},{"key":"e_1_3_2_1_27_1","volume-title":"Posting in the Cloudflare Blog","author":"Kwiatkowski Kris","year":"2019","unstructured":"Kris Kwiatkowski and Armando Faz-Hern\u00e1ndez . Introducing circl : An advanced cryptographic library . Posting in the Cloudflare Blog , 2019 . https: \/\/blog.cloudflare.com\/introducing-circl\/. Kris Kwiatkowski and Armando Faz-Hern\u00e1ndez. Introducing circl: An advanced cryptographic library. Posting in the Cloudflare Blog, 2019. https: \/\/blog.cloudflare.com\/introducing-circl\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"e_1_3_2_1_29_1","volume-title":"March","author":"Mooney Nick","year":"2020","unstructured":"Nick Mooney . An Introduction to the Noise Protocol Framework , March 2020 . https:\/\/duo.com\/labs\/tech-notes\/noise-protocol-framework-intro. Nick Mooney. An Introduction to the Noise Protocol Framework, March 2020. https:\/\/duo.com\/labs\/tech-notes\/noise-protocol-framework-intro."},{"key":"e_1_3_2_1_30_1","first-page":"72","volume-title":"Benchmarking postquantum cryptography in TLS","author":"Paquin Christian","year":"2020","unstructured":"Christian Paquin , Douglas Stebila , and Goutam Tamvada . Benchmarking postquantum cryptography in TLS . In Jintai Ding and Jean-Pierre Tillich, editors, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020 , pages 72 -- 91 . Springer , Heidelberg, 2020. Christian Paquin, Douglas Stebila, and Goutam Tamvada. Benchmarking postquantum cryptography in TLS. In Jintai Ding and Jean-Pierre Tillich, editors, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, pages 72--91. Springer, Heidelberg, 2020."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Chris\n      Peikert\n    .\n  He gives C-sieves on the CSIDH\n  . In Anne Canteaut and Yuval Ishai editors EUROCRYPT \n  2020 Part II volume \n  12106\n   of \n  LNCS pages \n  463\n  --\n  492\n  . \n  Springer Heidelberg May 2020.  Chris Peikert. He gives C-sieves on the CSIDH. In Anne Canteaut and Yuval Ishai editors EUROCRYPT 2020 Part II volume 12106 of LNCS pages 463--492. Springer Heidelberg May 2020.","DOI":"10.1007\/978-3-030-45724-2_16"},{"key":"e_1_3_2_1_32_1","unstructured":"Trevor Perrin. Noise protocol framework. https:\/\/noiseprotocol.org\/noise.pdf (Revision 34 vom 2018-07--11).  Trevor Perrin. Noise protocol framework. https:\/\/noiseprotocol.org\/noise.pdf (Revision 34 vom 2018-07--11)."},{"key":"e_1_3_2_1_33_1","volume-title":"December","author":"Perrin Trevor","year":"2017","unstructured":"Trevor Perrin . The Noise Protocol Framework , December 2017 . https:\/\/media.ccc.de\/v\/34c3--9222-the_noise_protocol_framework. Trevor Perrin. The Noise Protocol Framework, December 2017. https:\/\/media.ccc.de\/v\/34c3--9222-the_noise_protocol_framework."},{"key":"e_1_3_2_1_34_1","first-page":"2018","article-title":"Static-Static Pattern Modifiers for Noise, 2018","volume":"1","author":"Perrin Trevor","unstructured":"Trevor Perrin and Justin Cormack . Static-Static Pattern Modifiers for Noise, 2018 . Revision 1 , 2018 -- 2011 --18, unofficial\/unstable, https:\/\/github.com\/noiseprotocol\/noise_ss_spec. Trevor Perrin and Justin Cormack. Static-Static Pattern Modifiers for Noise, 2018. Revision 1, 2018--11--18, unofficial\/unstable, https:\/\/github.com\/noiseprotocol\/noise_ss_spec.","journal-title":"Revision"},{"key":"e_1_3_2_1_35_1","first-page":"98","volume-title":"ACM CCS 2002","author":"Rogaway Phillip","year":"2002","unstructured":"Phillip Rogaway . Authenticated-encryption with associated-data. In Vijayalakshmi Atluri, editor , ACM CCS 2002 , pages 98 -- 107 . ACM Press , November 2002 . Phillip Rogaway. Authenticated-encryption with associated-data. In Vijayalakshmi Atluri, editor, ACM CCS 2002, pages 98--107. ACM Press, November 2002."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"e_1_3_2_1_37_1","volume-title":"April","author":"Valsorda Filippo","year":"2021","unstructured":"Filippo Valsorda . Twitter-Survey on Crypto-Agility , April 2021 . https:\/\/twitter.com\/FiloSottile\/status\/1386751406758105089. Filippo Valsorda. Twitter-Survey on Crypto-Agility, April 2021. https:\/\/twitter.com\/FiloSottile\/status\/1386751406758105089."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":36,"alternative-id":["10.1145\/3548606.3560577","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560577","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}