How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol

Benedikt Auerbach

34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Crypto 4: Systems and Protocols