2025-06-07 19:49 GMT+02:00 Loganaden Velvindron <logana...@gmail.com>:
> ML-KEM implementations may suffer from compiler optimizations that could 
> weaken
> the security properties of a pure ML-KEM implementation such as Kyberslash.

That is both a general risk independent of the algorithm, and in the specific 
case only applicable when reusing public keys. (Yet another discussion that 
could be avoided by forbidding key reuse!)
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to