LMS vs XMSS: comparison of stateful hash-based signature schemes on ARM Cortex-M4
From MaRDI portal
Publication:5048974
Recommendations
Cites work
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- ARMed SPHINCS
- Advances in Cryptology - EUROCRYPT 2004
- Cryptography and Coding
- Digital Signatures Out of Second-Preimage Resistant Hash Functions
- Forward secure signatures on smart cards
- High-speed high-security signatures
- Merkle Signatures with Virtually Unlimited Signature Capacity
- Merkle Tree Traversal Revisited
- Optimal tree-based one-time digital signature schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Practical collision attacks against round-reduced SHA-3
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
Cited in
(6)- Benchmarking and analysing the NIST PQC lattice-based signature schemes standards on the ARM cortex M7
- An efficient software implementation of the hash-based signature scheme MSS and its variants
- XMSS and embedded systems. XMSS hardware accelerators for RISC-V
- Dilithium for memory constrained devices
- Simple and memory-efficient signature generation of XMSS\textsuperscript{MT}
- Putting wings on SPHINCS
This page was built for publication: LMS vs XMSS: comparison of stateful hash-based signature schemes on ARM Cortex-M4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5048974)