You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
maybe Kyber, maybe not (and then, Dilithium, FALCON or SPHINCS+):
"I am thus deeply sceptical of claims that Kyber-{512,768,1024} are as hard to break as AES-{128,192,256} by known attacks, never mind the risks from future attacks. I recommend that NIST withdraw those claims. Furthermore, given the considerable risk of Kyber-512 being weaker than AES-128, I recommend terminating the standardization of Kyber-512"
currently, we only support (and set by default) curve25519 / ed25519. adding kyber would make sense:
https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html
https://blog.cloudflare.com/post-quantum-to-origins/
https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html
https://asecuritysite.com/pqc/circl_hybrid
The text was updated successfully, but these errors were encountered: