The following pages link to SPHINCS (Q36573):
Displayed 19 items.
- XMSS and embedded systems. XMSS hardware accelerators for RISC-V (Q778953) (← links)
- A scalable post-quantum hash-based group signature (Q831185) (← links)
- Grafting trees: a fault attack against the SPHINCS framework (Q1644759) (← links)
- A non-PCP approach to succinct quantum-safe zero-knowledge (Q2096535) (← links)
- Post-quantum ID-based ring signatures from symmetric-key primitives (Q2096649) (← links)
- On subset-resilient hash function families (Q2115743) (← links)
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets (Q2117035) (← links)
- Differential power analysis of the Picnic signature scheme (Q2118537) (← links)
- Verifying post-quantum signatures in 8 kB of RAM (Q2118545) (← links)
- An intermediate secret-guessing attack on hash-based signatures (Q2128758) (← links)
- On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer (Q2146073) (← links)
- Post-quantum key-blinding for authentication in anonymity networks (Q2146075) (← links)
- \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme (Q2149820) (← links)
- Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature (Q2698345) (← links)
- Differential Power Analysis of XMSS and SPHINCS (Q3297557) (← links)
- A Note on the Instantiability of the Quantum Random Oracle (Q5041239) (← links)
- Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security (Q5048972) (← links)
- LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 (Q5048974) (← links)
- Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds (Q5071468) (← links)