This work presents a novel machine-checked tight security proof for XMSS —a stateful hash-based signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) employed as a primary building block of SPHINCS +, one of the signature schemes recently selected for standardization as a result of NIST’s post-quantum competition. In 2020, Kudinov, Kiktenko, and Fedoro pointed out a flaw affecting the tight security proofs of SPHINCS + and XMSS. For the case of SPHINCS +, this flaw was fixed in a subsequent tight security proof by Hülsing and Kudinov. Unfortunately, employing the fix from this proof to construct an analogous tight security proof for XMSS would merely demonstrate security with respect to an insufficient notion. A...
Quantum computing poses challenges to public key signatures as we know them today. LMS and XMSS are ...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
This work presents a novel machine-checked tight security proof for XMSS —a stateful hash-based sign...
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and pract...
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and prac...
Digital signatures are one of the most important cryptographic primitives in practice. They are an e...
This work presents new speed records for XMSS (RFC 8391) signature verification on embedded devices....
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
In 2020, Kudinov, Kiktenko, and Fedorov pointed out a flaw in the tight security proof of the SPHINC...
We instantiate the hash-based post-quantum stateful signature schemes XMSS and its multi-tree versio...
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
Quantum computing poses challenges to public key signatures as we know them today. LMS and XMSS are ...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
This work presents a novel machine-checked tight security proof for XMSS —a stateful hash-based sign...
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and pract...
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and prac...
Digital signatures are one of the most important cryptographic primitives in practice. They are an e...
This work presents new speed records for XMSS (RFC 8391) signature verification on embedded devices....
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
In 2020, Kudinov, Kiktenko, and Fedorov pointed out a flaw in the tight security proof of the SPHINC...
We instantiate the hash-based post-quantum stateful signature schemes XMSS and its multi-tree versio...
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantag...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
Quantum computing poses challenges to public key signatures as we know them today. LMS and XMSS are ...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...