An intermediate secret-guessing attack on hash-based signatures
From MaRDI portal
Publication:2128758
DOI10.1007/978-3-030-85987-9_11zbMATH Open1497.94136OpenAlexW3198120256MaRDI QIDQ2128758FDOQ2128758
Authors: Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-85987-9_11
Recommendations
implementationpost-quantum cryptographyhash-based signaturesK2SN-MSSmulti-target attacksXMSS\textsuperscript{MT}
Cites Work
- SWIFFT: A Modest Proposal for FFT Hashing
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Zero-knowledge proofs from secure multiparty computation
- Improving stateless hash-based signatures
- SPHINCS: practical stateless hash-based signatures
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
- Merkle Tree Traversal Revisited
- Merkle Signatures with Virtually Unlimited Signature Capacity
- CMSS – An Improved Merkle Signature Scheme
- Cryptography and Coding
- Mitigating multi-target attacks in hash-based signatures
- An efficient post-quantum one-time signature scheme
- Analysis of a proposed hash-based signature standard
- ARMed SPHINCS
- Digital Signatures Out of Second-Preimage Resistant Hash Functions
- Multi-target attacks on the Picnic signature scheme and related protocols
- An analysis of OpenSSL's random number generator
Cited In (14)
- Leighton-Micali hash-based signatures in the quantum random-oracle model
- Hash-based signatures revisited: a dynamic FORS with adaptive chosen message security
- Multi-target attacks on the Picnic signature scheme and related protocols
- Novel version of Merkle cryptosystem
- Mitigating multi-target attacks in hash-based signatures
- Practical attacks against the walnut digital signature scheme
- Title not available (Why is that?)
- On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- An attack on the Walnut digital signature algorithm
- Probabilistic hash-and-sign with retry in the quantum random oracle model
- Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or $$\text {SPHINCS}^{+}$$ Signatures
- Quantum-access security of hash-based signature schemes
- Differential power analysis of XMSS and SPHINCS
Uses Software
This page was built for publication: An intermediate secret-guessing attack on hash-based signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2128758)