Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available. Most of the public-key cryptosystems employed today on the Internet, in both software and in hardware, are based on number-theoretic problems which are thought to be intractable on a classical (non-quantum) computer and hence are considered secure. The most popular such examples are the RSA encryption and signature schemes, and the Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol employed widely in the SSL/TLS protocols. However, these schemes offer essentially zero security against an adversary in possession of a large-scale quantum computer. Thus, there is an urgen...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
The security guarantees provided by digital signatures are vital to many modern applications such as...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The digital signature scheme, which underpins most of the existing distributed ledgers, is generally...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
This work contributes to two independent topics: (1) Provably secure and efficient signature schemes...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
The security guarantees provided by digital signatures are vital to many modern applications such as...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The digital signature scheme, which underpins most of the existing distributed ledgers, is generally...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
This work contributes to two independent topics: (1) Provably secure and efficient signature schemes...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...