[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
"Kampanakis, Panos" <kpanos@amazon.com> Fri, 07 November 2025 18:32 UTC
Return-Path: <prvs=399bceee0=kpanos@amazon.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 18A1D859352A; Fri, 7 Nov 2025 10:32:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=amazon.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdelPWDJPxa2; Fri, 7 Nov 2025 10:32:06 -0800 (PST)
Received: from iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com (iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com [34.193.58.168]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6564B85934B1; Fri, 7 Nov 2025 10:31:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazoncorp2; t=1762540313; x=1794076313; h=from:to:date:message-id:references:in-reply-to: mime-version:subject; bh=mj1uV/tZbObRqqDwGBivNOn2MNnusB7NPpxnbJ2z+cA=; b=OsYlORstso1yD4IhN7siRQesAtaPgkMpOrqSKylIe8D07JWOCT/2AaDn jLGS69xOJIUyGqb2W2t0cctbM7Cs2zruNRuw25I+SJ0jnGC+ZUOMVszyr psZrWqRkykZD4n2dd4EldQuLaZ0IETjDcX5EGk66XaIrq/n1kXvLbsNi0 IozWG0CV4kGglzxkXwJxOyFqZmMNruG68e+qH90C+rdtz6V0Nu8AJ/2wj EfsjFKDhEbi0ds7rEF1mgXdB13ptoknKqukhTP1eSvoFP1xIHu2Xmxum1 197ey5P3ki3uTOAfgoE7QViIxF7AJ+QTEZ6qevZoRuABaXsXSz0Sl6i45 g==;
X-CSE-ConnectionGUID: yiEZ4W2wTY+7jXTC0brq/Q==
X-CSE-MsgGUID: 53ynegGzTpeFdL1xHVc4Ng==
X-IronPort-AV: E=Sophos;i="6.19,287,1754956800"; d="scan'208,217";a="5793089"
Thread-Topic: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
Received: from ip-10-4-22-235.ec2.internal (HELO smtpout.naws.us-east-1.prod.farcaster.email.amazon.dev) ([10.4.22.235]) by internal-iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Nov 2025 18:31:50 +0000
Received: from EX19MTAUEC002.ant.amazon.com [52.94.133.130:12385] by smtpin.naws.us-east-1.prod.farcaster.email.amazon.dev [10.0.19.136:2525] with esmtp (Farcaster) id 2dec6b55-44c8-4b94-a7c4-51e578b8b300; Fri, 7 Nov 2025 18:31:50 +0000 (UTC)
X-Farcaster-Flow-ID: 2dec6b55-44c8-4b94-a7c4-51e578b8b300
Received: from EX19EXOUEA002.ant.amazon.com (10.252.134.207) by EX19MTAUEC002.ant.amazon.com (10.252.135.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.29; Fri, 7 Nov 2025 18:31:49 +0000
Received: from SN1PR07CU001.outbound.protection.outlook.com (10.252.134.239) by EX19EXOUEA002.ant.amazon.com (10.252.134.207) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.29 via Frontend Transport; Fri, 7 Nov 2025 18:31:49 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=lHc5Z+KNT23V8xTCFosNaiKhNeQKrXbzsgEolvO/g/5ngaI1VbuMrrcAEE3/Jh/a9QEgclSQIkg1mfZ9nHsq7mf0ms9MeTQbA+CY22DH8hQBYZEA1KU20YMbrG3UkQ9xDj3DVdvEiaRtnS4bGevZoCcIVKZ1K31o8YLcLhRbaa99pguW5bsxYvyhiY8HVOM7vUOuPLgn0k1CF2mmBZpsI5wO7ruIkELDRWrBpXJNfAV7GrsbwX1zOPg0WYUTBDwCRCTFzqFeRPoMr77byDVWQjTS0vksJ07ZLqEn2Oxv5NMglYGAj4ZX9ATi38etDUbiMHNqEIlfTqSBU7VGn0kRyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mj1uV/tZbObRqqDwGBivNOn2MNnusB7NPpxnbJ2z+cA=; b=B2MfOkZKsMMdkayZQBMgQ4cWCTF+PeSv0jcfzPPtusKUo4lNi7f4UYwf+dnNiA56sUsjUCDm+biKv952gIsBgPSGyxVl1NVV3MDHmqmh2ujUCNcq7NFmHLkakun3SHQRzHQO2U74lSZK9b0oyjhW1Cqjx2OZ42HQx2P+D3NAwyGLbWWuTiiOH3j0ULmbmeMTUC9+cCHNEdvd+fl6U0Z6zi76EOwvHGJlRH1b4plwbZY//IWVfkS55or/gjbKqQxGhI+R4nPVwqa35bPtgaA15BJMq8d0NPM8YL0FItysdItYdD2ls5uP8ntVTxmIb0g1UxGqmu9eUhd/cKr94rGqkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amazon.com; dmarc=pass action=none header.from=amazon.com; dkim=pass header.d=amazon.com; arc=none
Received: from DM5PR18MB2326.namprd18.prod.outlook.com (2603:10b6:4:b9::33) by SA6PR18MB6204.namprd18.prod.outlook.com (2603:10b6:806:412::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9275.16; Fri, 7 Nov 2025 18:31:44 +0000
Received: from DM5PR18MB2326.namprd18.prod.outlook.com ([fe80::6dd6:86fd:258:83be]) by DM5PR18MB2326.namprd18.prod.outlook.com ([fe80::6dd6:86fd:258:83be%4]) with mapi id 15.20.9298.010; Fri, 7 Nov 2025 18:31:43 +0000
From: "Kampanakis, Panos" <kpanos@amazon.com>
To: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>, "tls-chairs@ietf.org" <tls-chairs@ietf.org>, "draft-ietf-tls-mlkem@ietf.org" <draft-ietf-tls-mlkem@ietf.org>, "tls@ietf.org" <tls@ietf.org>, "sean@sn3rd.com" <sean@sn3rd.com>
Thread-Index: AQHcTx0gj90PVP78u0CF+2Yi+isj3LTmzUcAgAC6abA=
Date: Fri, 07 Nov 2025 18:31:43 +0000
Message-ID: <DM5PR18MB2326D766FA5A96FA87649263ABC3A@DM5PR18MB2326.namprd18.prod.outlook.com>
References: <176236867319.904123.10146982018394612684@dt-datatracker-5df8666cb-7l4w5> <d8ee7e39c24d31457298b0a3deaafe501e31fbe0.camel@aisec.fraunhofer.de> <GVXPR07MB96781826FAEA76A7A1F187D289C3A@GVXPR07MB9678.eurprd07.prod.outlook.com>
In-Reply-To: <GVXPR07MB96781826FAEA76A7A1F187D289C3A@GVXPR07MB9678.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amazon.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM5PR18MB2326:EE_|SA6PR18MB6204:EE_
x-ms-office365-filtering-correlation-id: e6c52a97-60f3-4bce-53a8-08de1e2be6c3
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|7053199007|8096899003|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR18MB2326.namprd18.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(7053199007)(8096899003)(38070700021);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM5PR18MB2326D766FA5A96FA87649263ABC3ADM5PR18MB2326namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR18MB2326.namprd18.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6c52a97-60f3-4bce-53a8-08de1e2be6c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Nov 2025 18:31:43.7007 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5280104a-472d-4538-9ccf-1e1d0efe8b1b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: e+O2fwhjl0YUWIVk4d7PlgibLRaI3hLvflVWnCOZgYZLixtGj6N57fmjZjXAdMJTXRlKoZ8RYSFE+aGzm4gmhQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA6PR18MB6204
X-OriginatorOrg: amazon.com
Message-ID-Hash: R4EE6X72VI4734I2UYNLRTZ7M6JWVKMK
X-Message-ID-Hash: R4EE6X72VI4734I2UYNLRTZ7M6JWVKMK
X-MailFrom: prvs=399bceee0=kpanos@amazon.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/VeeAemvT1WFwmtuI09KsiLYlEA0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Hi John, > I completely agree that NIST requirements should be followed but explicitly mention 7.2 and not other mandatory requirements like the decapsulation input check in 7.3 might make the reader wondering if the mandatory requirements in e.g., 7.3. can be skipped, which I would disagree with. As with SSH, only the ciphertext length check in section 7.3 of FIPS203 apply to the client at decapsulation time because the other two check the decapsulation key which the client has generated itself and thus are unnecessary. The ciphertext length check is already in normative language in the text. > FIPS 203 forbids reuse of ephemeral keys, I don't get that. What text in FIPS 203 dictates that each keypair needs to be used only once? I missed it. I would be fine making the "still recommended that implementations avoid re-use of any keys (including ML-KEM keys)" normative, but I think 8446-bis is more suitable for it. The draft-ietf-tls-mlkem is not a good place to make such broad declarations about TLS 1.3 imo. From: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org> Sent: Friday, November 7, 2025 2:12 AM To: tls-chairs@ietf.org; draft-ietf-tls-mlkem@ietf.org; tls@ietf.org; sean@sn3rd.com Subject: [EXTERNAL] [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26) CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. Hi, I support publication as long as the major comments below are addressed. I think it is correct to publish the "groups" as RECOMMENDED = N and then discuss all algorithms together at a later stage. I can understand why some people strongly prefer hybrids to protect against implementation bugs, but I do not see why standalone ML-KEM should be marked as discouraged. It is a very well-studied algorithm believed to provide very good security. European governments are now stating that they have the highest confidence in ML-KEM. I think the recommended level should be above P-256, X25519, and all other algorithms providing zero security against quantum attackers. Major: - "The KeyShareClientHello includes a list of KeyShareEntry structs that represent the key establishment algorithms the client supports. For each parameter of ML-KEM the client supports, the corresponding KeyShareEntry consists of a NamedGroup that indicates the appropriate parameter, and a key_exchange value that is the pk output of the KeyGen algorithm." This seems like an explanation of the "supported_groups" extension, not the KeyShareClientHello. My understanding is that "supported_groups" represent the key establishment algorithms the client supports and that KeyShareClientHello is a subset. I suggest removing text (incorrectly) duplicating RFC 8446. - "For all parameter sets, the server MUST perform the encapsulation key check described in Section 7.2 of [FIPS203]" I completely agree that NIST requirements should be followed but explicitly mention 7.2 and not other mandatory requirements like the decapsulation input check in 7.3 might make the reader wondering if the mandatory requirements in e.g., 7.3. can be skipped, which I would disagree with. - "TLS 1.3 does not prohibit key re-use; some implementations may use the same ephemeral public key for more than one key establishment at the cost of limited forward secrecy. Care must be taken to ensure that keys are only re-used if the algorithms from which they are derived are designed to be secure under key-reuse. ML-KEM's IND-CCA security satisfies this requirement such that the public key/secret key pair can be used long-term or re-used without compromising the security of the keys. However, it is still recommended that implementations avoid re-use of any keys (including ML-KEM keys) to ensure perfect forward secrecy." This is wrong in many ways. FIPS 203 forbids reuse of ephemeral keys, which applies to this draft. IETF specifications referring to FIPS 203 may not use the same ephemeral public key for more than one key establishment. TLS WG has not discussed violating NISTs requirements, and I suspect most people in IETF do not want to violate NIST requirements for ML-KEM, I certainly don't. Ephemeral keys should be independent and reusing them has a large number of negative security consequences. As stated in NIST SP 1800-37 "Addressing Visibility Challenges with TLS 1.3 within the Enterprise High-Level Document": "Reuse of a key share allows passive observers to correlate different connections. This specification discourages client and server reuse of a key share for multiple internet connections. Reusing key shares outside protected facilities can also expand the impact of security breaches." And the above statement from NIST is too soft. If you believe in zero trust rather than perimeter security, reusing key shares can expand the impact of security breaches even within protected facilities. Moreover, reusing key shares also weakens post-compromise security. Minor: - I think the draft should mention that ML-KEM is very very fast. Suggestion: "Optimized implementations of ML-KEM achieve key generation, encapsulation, and decapsulation operations that are faster than elliptic-curve Diffie-Hellman mechanisms (such as X25519 or P-256) on modern 64-bit CPU architectures with vector instructions." - [AVIRAM], [DOWLING], [FO], [HHK], [HPKE], [hybrid], [LUCKY13], [RACCOON] are not used and should be removed. - OLD: key establishment mechanism (KEM) NEW: key encapsulation mechanism (KEM) Cheers, John
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Quynh Dang
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kampanakis, Panos
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Yaakov Stein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Loganaden Velvindron
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: [EXT] Re: WG Last Call: draft-ietf-tls-… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… David Adrian
- [TLS] Re: [EXT] Re: WG Last Call: draft-ietf-tls-… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Rebecca Guthrie
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Flo D
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kazuho Oku
- [TLS] Fwd: Re: WG Last Call: draft-ietf-tls-mlkem… Keegan Dasilva Barbosa
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kris Kwiatkowski
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Filippo Valsorda
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kris Kwiatkowski
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bob Beck
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: [EXTERNAL] Re: WG Last Call: draft-ietf… Yaakov Stein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Russ Housley
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Simon Josefsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Simon Josefsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Watson Ladd
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Jan Schaumann
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Wang Guilin
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kurt Roeckx
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kampanakis, Panos
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] WG Last Call: draft-ietf-tls-mlkem-05 (Ends… Sean Turner via Datatracker
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Watson Ladd
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… richard
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Peter Gutmann
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Deirdre Connolly
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Deployability claims D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Viktor Dukhovni
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson