Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Performance and applicability of post-quantum digital signature algorithms in resource-constrained environments
M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …
quantum-resistant cryptographic algorithms. In response to this demand, the National …
Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
Merkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practice
A Fregly, J Harvey, BS Kaliski Jr, S Sheth - Cryptographers' Track at the …, 2023 - Springer
Abstract We introduce the Merkle Tree Ladder (MTL) mode of operation for signature
schemes. MTL mode signs messages using an underlying signature scheme in such a way …
schemes. MTL mode signs messages using an underlying signature scheme in such a way …
{DSig}: Breaking the Barrier of Signatures in Data Centers
Data centers increasingly host mutually distrustful users on shared infrastructure. A powerful
tool to safeguard such users are digital signatures. Digital signatures have revolutionized …
tool to safeguard such users are digital signatures. Digital signatures have revolutionized …
Hash-Based Multi-Signatures for Post-Quantum Ethereum
With the threat posed by quantum computers on the horizon, systems like Ethereum must
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …
Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to and XMSS
Hash-based signatures offer a conservative alternative to post-quantum signatures with
arguably better-understood security than other post-quantum candidates. As a core building …
arguably better-understood security than other post-quantum candidates. As a core building …
Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today's era, numerous applications are evolving into smart applications by leveraging
technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The …
technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The …
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or Signatures
A Wagner, V Wesselkamp, F Oberhansl… - … Conference on Post …, 2023 - Springer
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the
authenticity of data in a post-quantum world. The stateful schemes LMS and XMSS and the …
authenticity of data in a post-quantum world. The stateful schemes LMS and XMSS and the …
SDitH in the QROM
The MPC in the Head (MPCitH) paradigm has recently led to significant improvements for
signatures in the code-based setting. In this paper we consider some modifications to a …
signatures in the code-based setting. In this paper we consider some modifications to a …
Quantum-resistant blockchain and performance analysis
F Wu, B Zhou, J Song, L **e - The Journal of Supercomputing, 2025 - Springer
Blockchain technology enables secure information and value exchange in untrusted
environments by integrating cryptographic techniques such as public–private key …
environments by integrating cryptographic techniques such as public–private key …