The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure once large scale quantum computers become practical. Therefore, substitutes resistant to quantum attacks楊nown as post-quantum cryptography預re required. In particular, hash-based signature schemes appear to be the most conservative choice for post-quantum digital signatures. In this work, we mount the first practical fault attack against hash-based cryptography. The attack was originally proposed by Castelnovi, Martinelli, and Prest [9] and allows the creation of a universal signature forgery that applies to all current standardisation candidates (XMSS, LMS, SPHINCS+, and Gravity-SPHINCS). We perform the attack on an Arduino Due board featuri...
International audienceThe NIST selection process for standardizing Post-Quantum Cryptography Mechani...
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Because they require no assumption besides the preimage or collision resistance of hash functions, h...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
This thesis surveys the current state of the art of hash-based cryptography with a view to finding v...
We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a b...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-fa...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
SPHINCS is a recently proposed stateless hash-based signature scheme and promising candidate for a p...
International audienceThe NIST selection process for standardizing Post-Quantum Cryptography Mechani...
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Because they require no assumption besides the preimage or collision resistance of hash functions, h...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
This thesis surveys the current state of the art of hash-based cryptography with a view to finding v...
We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a b...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-fa...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
SPHINCS is a recently proposed stateless hash-based signature scheme and promising candidate for a p...
International audienceThe NIST selection process for standardizing Post-Quantum Cryptography Mechani...
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The potential advent of quantum computers in coming years has motivated security researchers to star...