The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to solve (elliptic curve) discrete logarithm and integer factorization problems in polynomial time. This would jeopardize IT security as we know it. In this work, we investigate two quantum-safe, hash-based signature schemes published by the Internet Engineering Task Force and submitted to the National Institute of Standards and Technology for use in secure boot. We evaluate various parameter sets for the use-case in question and we prove that post-quantum signatures with less than one second signing and less than 10ms verification would not have material impact (less than1‰) on secure boot. We ev...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
The significant advances in the area of quantum computing of the past decade leave no doubt about th...
A secure boot protocol is fundamental to ensuring the integrity of the trusted computing base of a s...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
If quantum computers were built, they would pose concerns for public key cryptography as we know it....
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
The significant advances in the area of quantum computing of the past decade leave no doubt about th...
A secure boot protocol is fundamental to ensuring the integrity of the trusted computing base of a s...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
If quantum computers were built, they would pose concerns for public key cryptography as we know it....
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
The significant advances in the area of quantum computing of the past decade leave no doubt about th...