[TLS] Re: Composite ML-DSA
Sophie Schmieg <sschmieg@google.com> Wed, 15 April 2026 22:16 UTC
Return-Path: <sschmieg@google.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 71F2CDD310F9 for <tls@mail2.ietf.org>; Wed, 15 Apr 2026 15:16:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776291381; bh=V/0ZHrBBM5rGDOTSOXPrVGCjCbSYM/soirTHmrp3aWg=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=LFIVni1zVguJHUBI2o0VWhx15sPyNdbdisSpmazcznneVT4FJcZxeqhNiLe8gURsv iQH3XWT53yPxytWcdEdBP5gE158Bpfnxs3ImzMw/HLtnhuUvPzrfAQRm/mruMn+bEK VgDPs6Nn8yyH0FckPd+rLx05PrZYXH8likPezjzY=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -17.6
X-Spam-Level:
X-Spam-Status: No, score=-17.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OqP-FEA9d8Dh for <tls@mail2.ietf.org>; Wed, 15 Apr 2026 15:16:20 -0700 (PDT)
Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id BD2B9DD310F2 for <tls@ietf.org>; Wed, 15 Apr 2026 15:16:20 -0700 (PDT)
Received: by mail-wm1-x333.google.com with SMTP id 5b1f17b1804b1-488879dcbc3so12245e9.0 for <tls@ietf.org>; Wed, 15 Apr 2026 15:16:20 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1776291374; cv=none; d=google.com; s=arc-20240605; b=Xrbw7o4DmznfIkrLVzT4ewTmGO17aV2Ei8QUzEKjc6eLGi/aJq00LSN6/dSIDB52LI 40mnc7m38I0oDqd7D1Tp3gs31WzVmhe855qMSZgPJi+mYLL3SBUFOh9pkDUXZkd1Qwg4 JdU3RQpZW+absAHlFMA7Gl1ixKlChi0C+j80SIWZrNg/51JtPMOAoNxCXRIs/OYsF7Ek BDG+vhdbAKqk/dmUVd/XdHOreihr0JcR4AbanGrE07HnbWOMGeTHX/yjdp58uo0N8nPb YWS1O35XZyeHg3Fodl7tEAvWjeZClzzPCsb+iZzWy63051bleoWIBDA3qutGimnYILwl rJ+Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=OLtFyOZl3wI5rYXTT+RYID5xaZ3obgXyLd5+BuUA0y8=; fh=8NcakiwU3MteJbimJVuynkviKf3JG/irk/zE54FEwJg=; b=fna2atApm24pZLIZIGhi+/sMIqDR2bq8DYtIuy/MlYRBpo5S5sjMcexdiHwOqvzOpD VHiSy9/+1LRdbSc6hSUHS3Ec3TJGlSyOO7XuQfEwvGJHooy0DNVcHH3yDOZgh0VWlI4v wSast5akTw4cdvVg8CYrGRP2T/Z0lK2LX4gfDzIn9mhZv12O9SM36r0ZI9YbFEe66AhR LMc91HsUWZ1sIvTikxdXL/duIlIfqr2kAnNktl7krEtTkmNzat8CUSV5IK9OFbtOPdbg xiRsoXqvUSxJerf/2F0ozir2KT6F2/+r0Uemz9/JRfyJKECWJdJFEvsG1+UW2tBW08Lc Xhiw==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1776291374; x=1776896174; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=OLtFyOZl3wI5rYXTT+RYID5xaZ3obgXyLd5+BuUA0y8=; b=JB5M1HxiDAmyF0Fve8xK4jQUMgDEohorWySwENA8+OW0Xs/GEExjbFjOdmP+JN5fl9 K/jXRa+q+KrEnYSbmDOR6qF9aWFctQfV7SwKQsHXYnvC0cNgiMQ789B3Ur74klZlFtcr 0c+QFERjI2pYiRZhTYovfriXAXjJwuEnIT6lQ9F1n+ZECtzET3KzlZlBrfDkpb6p1+cq 6Ai5uqp4kXEgb2sHLf/tbGGCCBJB0DiTaLk7p26tiP8wRONXRIEHWy/pE8s1XwJNeG0f Yq7XJSGtEHfg6viOuJotOEKqi16jLwUU7lI2WPB5Yis4zNkVYKHBPAzr9/1GpNaLrxHF 1mwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776291374; x=1776896174; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=OLtFyOZl3wI5rYXTT+RYID5xaZ3obgXyLd5+BuUA0y8=; b=Phm/eeM9T4L9MBiOxnE0/oK5TfXI07h1h+2jQ8fTtALKZEsfkuaah7cwqNucXJI0C+ VaUK8rv2bzhgB+UlzUI3R1XOER5PwJgtvLV82VwNcG2a7EQhYfo9WgjPlX/7RZabbdFj CUPLSLFP78nYRTBJ9kMksdhn6WdwDsFuFAuJCRGdUqTUjtEc1Sraq6HbK0NEi3hdkAAv hBT/Y0fk6KwQCgHvYQxn99fdGb4wRTfpI+KpeVF3IqkBGBSMh+R0kLP6G7iz+SHYK+ji eaHfS+296A6KG1DO5AzPM53lpvZjdDrax7iWiLJzBho0TasreEHdbM2/5+bZx6c5R4J6 TKiA==
X-Gm-Message-State: AOJu0YwMRVMAeE8+tVvexHvNXv1McrlgFV3QQM+1VcobZE7YHGsWlKBm FlFw0vwhs/3OXQvMtS5je/DsEbIRQESNFj4Dqx+MZ//vKameCTwgQSDaD8pI/BlxzVrBUgWWA6V hd4fF7fR3r0l7r2Aw0LXm6qIcE7guvLKAREFCBhkBY/Zz+/hmG0mKobdWYHU=
X-Gm-Gg: AeBDieuF077Xx/T3rPlG1jFpVxJlKgVUp8Iv14o/cjcZX6S2yiv1jrcdqtItYNJyvmK sBP5TgKIdFEFihU8yaxVZ1h7iz6AX4Zakbk3GzMSOVn0D+mqSwSAsrOvOeKTYlY888oyh9BmBq7 t3Cyx3Lcrm5n3USFPw7YuzVU49/XH/5gkm0I3AsSd94y/xzz7x1UQ1LedIMa0ubMq5mI+e0ur+n Ens66CTZzdyZEDfZ0bQzP5TNiaYYqZF87pAK/4VsxVZfvcT1Cy/HFvsTGZUYy8dwnvzlpiSm0Ih BWHnC1C0B2Q/6TRZIolG/xN1vET+Ege2PAle/KzH4dAiMtMamGa29ksi+lxtudcdj6Jxurm8mfS YoSztDSUCeF98q2I=
X-Received: by 2002:a05:600d:c:b0:485:b6e4:9808 with SMTP id 5b1f17b1804b1-488f5110da2mr137095e9.1.1776291373216; Wed, 15 Apr 2026 15:16:13 -0700 (PDT)
MIME-Version: 1.0
References: <16CF0FDA-7263-461A-9F2B-D37DBEAF5DD9@sn3rd.com> <25c8d414-e4c8-455b-bd64-28132615ba75@cs.tcd.ie> <68f49a81-dd2c-4bea-896a-87da3e6aff68@tu-dresden.de> <CAMjbhoWwvfkfScpbf4-5PBzk__qb+6M4ZzAOba64kk9aXBba5g@mail.gmail.com> <d47a34ab-7fb9-4687-84aa-a5fa6bcf6a6c@tu-dresden.de> <2971d01a-89e3-43d3-a01d-b9c17b178763@amongbytes.com> <692bb582-ab7e-4d6b-aa75-ac5d93228bb2@tu-dresden.de> <DS4PPFA08475C7DBE27468E40C672197481C1242@DS4PPFA08475C7D.namprd11.prod.outlook.com> <LV0PR21MB6623B48B1F3A05D745F5A79D8C242@LV0PR21MB6623.namprd21.prod.outlook.com> <ad0svakv_WUM3btz@chardros.imrryr.org> <CAF8qwaBU_YHWX2MsWeeaOJ8sutR1wMozvbiTJF5kyvTE8YjWWA@mail.gmail.com> <CACsn0c=GDta824UF7uJ3nw_4U_rT=XhYOGHRemMWa+2AdbsiAg@mail.gmail.com> <3a16c7c4-345e-48ce-af70-a3bf503c8caf@app.fastmail.com> <CACf5n7_0hdeHJXXucva9pb=+pjhcgveHRpjA8XAcXB3LsYUvaw@mail.gmail.com> <CAFpG3gcC+UfO7E=ADGhwr2En5PwipZiq_r6_RdqvmT-5nnh2jw@mail.gmail.com> <d69ba150-0257-4e64-9abb-9229d03a03a6@app.fastmail.com> <129715714.1963.1776284832509@app.mailbox.org>
In-Reply-To: <129715714.1963.1776284832509@app.mailbox.org>
From: Sophie Schmieg <sschmieg@google.com>
Date: Wed, 15 Apr 2026 15:16:01 -0700
X-Gm-Features: AQROBzBt5Jm-heUcwCEB3X_XVY0v1YW0sqkLThvo7iALkRXBGaI8fsWnjuA83a0
Message-ID: <CAEEbLAYbQF5XapVPqGbNCuj64oYiYQ5BO5WnRBeXFQuFzs=o8g@mail.gmail.com>
To: tim.beckmann=40mailbox.org@dmarc.ietf.org
Content-Type: multipart/alternative; boundary="000000000000521f89064f871038"
Message-ID-Hash: OIAHXYDWAGNJWYITWRQ2ZWRSUC3OVBCQ
X-Message-ID-Hash: OIAHXYDWAGNJWYITWRQ2ZWRSUC3OVBCQ
X-MailFrom: sschmieg@google.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tls@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Composite ML-DSA
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/dgtr2zMoHxiwasmgL1PvoR_oLuo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
hi all, here is my dump on thoughts about hybrid signatures, apologizes if some of the points have already been brought up before When it comes to implementation security, I've never fully bought the argument that hybrids pose a meaningful defense. The most dangerous implementation vulnerabilities are things like spectre, row hammer, or good old buffer overflows. Since memory is shared, the vulnerability of a hybrid implementation to these issues is the union of the risk surfaces of the individual implementation, so using a hybrid increases the risks. You could argue that correctness related vulnerabilities like CRT faults or point not on curve attacks are the main implementation mistakes hybrids protect against, but given the design of the PQC algorithms which do not allow for many subtle logic bugs (at least as long as one uses seeds as private keys [1]), and the bugs they do allow for can be tests very well using high quality test vector suites like Wycheproof (It was actually difficult to find compelling test cases for Wycheproof due to the design decisions made in the spec which made many creative input choices simply not work, as opposed to classical crypto where such creative choices result in fun vulnerabilities). In my experience, by far the biggest risk when it comes to signatures is not in the algorithms themselves, but implementers either forgetting to verify, ignoring the verification result, or forgetting to check that the message actually attests to the thing they wanted attesting for (i.e. the valid certificate for a different domain problem). If the hybrid is implemented as a single algorithm, this risk doesn't differ between hybrid and non-hybrid signature (and this is one of the reasons why I strongly prefer this approach). The more details of the hybrid construction is exposed to the caller, the more this is no longer the case. If you teach a verifier to ignore some signatures, you add code that is a frighteningly close Hamming distance away from code that ignores all signatures. If you want to do things like using an HSM for your classical signature, but a software implementation for your PQC signature, the only takeaway that I can see is to bury this capability as deep in the cryptographic library as possible, and not expose any of it to the caller (other than possibly a boolean flag that enables the HSM or a classical software implementation, but even that is dubious). In many cases, signature keys can be revoked with varying amounts of pain. In those circumstances, the additional security benefit of hybrids is soley in defense against unpublished attacks, as published attacks will be mitigated via revocation. As the blast radius for signatures has a strict end with revocation of the key (as opposed to encryption, where any ciphertext that has ever been encrypted with the algorithm is now up for grabs), this is good enough in most threat models, and as such I don't consider hybrid signatures essential in those use cases. When they can be done without additional cost (this cost can be in terms of performance, overhead or even coordination headwinds), I still recommend using hybrid signatures, but with a heavy bias towards just using pure signatures in case of difficulties arising. Most importantly for the IETF here are the coordination difficulties. I much prefer having pure ML-DSA over not having any PQC signature at all. There are cases where revocation is not really possible, like for example firmware signing keys. Here I much prefer having SLH-DSA, or as a fallback, hybrid signatures, but these usually do not require fully standardized solutions for the hybrid construction. [1] https://eprint.iacr.org/2024/523 On Wed, Apr 15, 2026 at 1:27 PM <tim.beckmann=40mailbox.org@dmarc.ietf.org> wrote: > Hi, > > I'd like to add a perspective on why hybrid certificates and > authentication are useful. My background is with IoT and OT (operational > technology) devices manufactured by medium-sized businesses. These devices > often maintain a connection to the manufacturer's backend, mutually > authenticated by small scale private PKIs (plural, because device > certificates and backend certificates are under different roots). > > The deployment of these devices has the unfortunate property that between > production and first installation a lot of time can pass, sometimes upwards > of a year. With IoT, this can be because the devices are stored in a crate > or a shelf somewhere along the retail chain, with OT, operators keep > devices in storage for hot swapping in case of hardware failures for any of > the deployed devices. > > The transition from traditional to post-quantum authentication methods > poses a significant problem for these device classes. In many other > scenarios, you can flip the switch from ECDSA-based authentication to > ML-DSA-based authentication the moment you judge the CRQC threat as too > high by pushing a config or software/firmware update. (This requires that > PQ-keys/-certificates have been distributed beforehand, of course.) But > devices lying in storage have no active internet connection to receive that > information. When they authenticate the backend many months later, for the > first time in over a year, the ECDSA keys might have been compromised > already. (Under the assumption that attacks against EC keys are widely > available soon. I'm still somewhat on the fence about that in regard to > targets that don't have extremely high value.) > > One way around that dilemma is to do an initial check on whether > authentication should be switched over, by connecting to a special endpoint > once with ECDSA certificates and once with ML-DSA certificates and verify > that both give the same advice (and abort if they don't). But from an > operational perspective, issuing hybrid certificates as soon as possible > and just using those for mutual TLS seems to be the easiest and most robust > solution. > > (Now, there are a lot of hurdles along the way. Most notably, secure > elements (and cellular modems with TLS stacks) are still widely missing > ML-DSA support (or SLH-DSA for that matter), but we have that problem with > non-composites as well.) > > What are your thoughts on that? Do you know of a more straightforward > solution? Relying only on ML-DSA as soon as possible is problematic, both > because of customer concern and regulatory requirements. > > Best regards, > Tim Beckmann > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org > -- Sophie Schmieg | Information Security Engineer | ISE Crypto | sschmieg@google.com
- [TLS] Re: Composite ML-DSA John Mattsson
- [TLS] Re: Working Group Last Call for Use of ML-D… Filippo Valsorda
- [TLS] Working Group Last Call for Use of ML-DSA i… Sean Turner
- [TLS] Re: Working Group Last Call for Use of ML-D… Russ Housley
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Salz, Rich
- [TLS] Re: Working Group Last Call for Use of ML-D… Yaroslav Rosomakho
- [TLS] Re: Working Group Last Call for Use of ML-D… Kris Kwiatkowski
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: [EXTERNAL] Re: Working Group Last Call … Andrei Popov
- [TLS] Re: [EXTERNAL] Re: Working Group Last Call … Stephen Farrell
- [TLS] Re: [EXTERNAL] Working Group Last Call for … Andrei Popov
- [TLS] Re: Working Group Last Call for Use of ML-D… Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Quynh Dang
- [TLS] Re: Working Group Last Call for Use of ML-D… Stephen Farrell
- [TLS] Re: [EXTERNAL] Re: Working Group Last Call … Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Jack Grigg
- [TLS] Re: Working Group Last Call for Use of ML-D… Daniel Van Geest
- [TLS] Re: Working Group Last Call for Use of ML-D… Rob Sayre
- [TLS] Re: Working Group Last Call for Use of ML-D… Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: [EXTERNAL] Re: Working Group Last Call … Ilari Liusvaara
- [TLS] Re: [EXTERNAL] Re: Working Group Last Call … Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Nadim Kobeissi
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Russ Housley
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Stephen Farrell
- [TLS] Re: Working Group Last Call for Use of ML-D… Rob Sayre
- [TLS] Re: Working Group Last Call for Use of ML-D… Jan Schaumann
- [TLS] Re: Working Group Last Call for Use of ML-D… Corey Bonnell
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Salz, Rich
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Eric Rescorla
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Soatok Dreamseeker
- [TLS] Re: Working Group Last Call for Use of ML-D… Eric Rescorla
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Watson Ladd
- [TLS] Re: Working Group Last Call for Use of ML-D… Loganaden Velvindron
- [TLS] Re: Working Group Last Call for Use of ML-D… Ilari Liusvaara
- [TLS] Re: Working Group Last Call for Use of ML-D… Eric Rescorla
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Salz, Rich
- [TLS] Re: Working Group Last Call for Use of ML-D… Kris Kwiatkowski
- [TLS] Re: Working Group Last Call for Use of ML-D… Kris Kwiatkowski
- [TLS] Re: Working Group Last Call for Use of ML-D… Rob Sayre
- [TLS] Re: Working Group Last Call for Use of ML-D… Robert Relyea
- [TLS] Re: Working Group Last Call for Use of ML-D… Salz, Rich
- [TLS] Re: Working Group Last Call for Use of ML-D… Yaroslav Rosomakho
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Rob Sayre
- [TLS] Re: Working Group Last Call for Use of ML-D… Marc Penninga
- [TLS] Re: Working Group Last Call for Use of ML-D… Michael StJohns
- [TLS] Re: Working Group Last Call for Use of ML-D… Martin Thomson
- [TLS] Re: Working Group Last Call for Use of ML-D… Ilari Liusvaara
- [TLS] Re: Working Group Last Call for Use of ML-D… Peter Gutmann
- [TLS] Re: Working Group Last Call for Use of ML-D… tirumal reddy
- [TLS] Re: Working Group Last Call for Use of ML-D… Soatok Dreamseeker
- [TLS] Re: Working Group Last Call for Use of ML-D… Jack Grigg
- [TLS] Re: Working Group Last Call for Use of ML-D… Eric Rescorla
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Joshua
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Wang Guilin
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Scott Fluhrer (sfluhrer)
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Andrei Popov
- [TLS] Re: Working Group Last Call for Use of ML-D… Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Kris Kwiatkowski
- [TLS] Re: Working Group Last Call for Use of ML-D… Watson Ladd
- [TLS] Re: Working Group Last Call for Use of ML-D… Filippo Valsorda
- [TLS] Re: Working Group Last Call for Use of ML-D… David Adrian
- [TLS] Re: Working Group Last Call for Use of ML-D… Daniel Apon
- [TLS] Re: Working Group Last Call for Use of ML-D… Yaroslav Rosomakho
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Composite ML-DSA tirumal reddy
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Composite ML-DSA tirumal reddy
- [TLS] Re: Working Group Last Call for Use of ML-D… Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Scott Fluhrer (sfluhrer)
- [TLS] Re: Working Group Last Call for Use of ML-D… David Adrian
- [TLS] Re: Working Group Last Call for Use of ML-D… John Mattsson
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Ilari Liusvaara
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Russ Housley
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Michael StJohns
- [TLS] Re: Composite ML-DSA Salz, Rich
- [TLS] Re: Composite ML-DSA Scott Fluhrer (sfluhrer)
- [TLS] Re: Working Group Last Call for Use of ML-D… Soatok Dreamseeker
- [TLS] Re: Composite ML-DSA Sean Turner
- [TLS] Re: Composite ML-DSA Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Sophie Schmieg
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Filippo Valsorda
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Tim Hudson
- [TLS] Re: Working Group Last Call for Use of ML-D… Robert Relyea
- [TLS] Re: Composite ML-DSA David Benjamin
- [TLS] Re: Composite ML-DSA Salz, Rich
- [TLS] Re: Composite ML-DSA David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Russ Housley
- [TLS] Re: Working Group Last Call for Use of ML-D… Joshua
- [TLS] Re: Working Group Last Call for Use of ML-D… Viktor Dukhovni
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Working Group Last Call for Use of ML-D… Robert Relyea
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Sean Turner
- [TLS] Re: Composite ML-DSA Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Salz, Rich
- [TLS] Re: Composite ML-DSA Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Salz, Rich
- [TLS] Re: Composite ML-DSA Daniel Van Geest
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Composite ML-DSA Daniel Van Geest
- [TLS] Re: Working Group Last Call for Use of ML-D… Wang Guilin
- [TLS] Re: Working Group Last Call for Use of ML-D… Thom Wiggers
- [TLS] Re: Working Group Last Call for Use of ML-D… Sophie Schmieg
- [TLS] Re: Working Group Last Call for Use of ML-D… Peter Gutmann
- [TLS] Re: Working Group Last Call for Use of ML-D… Falko Strenzke
- [TLS] Re: Composite ML-DSA Viktor Dukhovni
- [TLS] Re: Composite ML-DSA Andrei Popov
- [TLS] Re: Composite ML-DSA Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Composite ML-DSA Nico Williams
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Christopher Patton
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Rob Sayre
- [TLS] Re: Working Group Last Call for Use of ML-D… Simon Josefsson
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Yaroslav Rosomakho
- [TLS] Re: Composite ML-DSA Simon Josefsson
- [TLS] Re: Composite ML-DSA Simon Josefsson
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Composite ML-DSA Filippo Valsorda
- [TLS] Re: Composite ML-DSA Daniel Van Geest
- [TLS] Re: Working Group Last Call for Use of ML-D… Dennis Jackson
- [TLS] Re: Composite ML-DSA Dennis Jackson
- [TLS] Re: Working Group Last Call for Use of ML-D… Simon Josefsson
- [TLS] Re: Working Group Last Call for Use of ML-D… David Benjamin
- [TLS] Re: Working Group Last Call for Use of ML-D… Peter C
- [TLS] Re: Composite ML-DSA Nadim Kobeissi
- [TLS] Re: Working Group Last Call for Use of ML-D… Simon Josefsson
- [TLS] Re: Working Group Last Call for Use of ML-D… Bas Westerbaan
- [TLS] Re: Working Group Last Call for Use of ML-D… Muhammad Usama Sardar
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Composite ML-DSA Scott Fluhrer (sfluhrer)
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Composite ML-DSA Eric Rescorla
- [TLS] Re: Composite ML-DSA Daniel Van Geest
- [TLS] Re: Composite ML-DSA Nico Williams
- [TLS] Re: Composite ML-DSA tim.beckmann
- [TLS] Re: Composite ML-DSA Sophie Schmieg
- [TLS] Re: Composite ML-DSA Peter Gutmann
- [TLS] Re: Working Group Last Call for Use of ML-D… Yaakov Stein
- [TLS] Re: Composite ML-DSA Mike Ounsworth
- [TLS] Re: Composite ML-DSA Watson Ladd
- [TLS] Re: Composite ML-DSA Mike Ounsworth
- [TLS] Re: Composite ML-DSA Daniel Van Geest
- [TLS] Re: [EXTERNAL] Re: Composite ML-DSA John Gray
- [TLS] Re: Composite ML-DSA Falko Strenzke