[HTML][HTML] Performance and applicability of post-quantum digital signature algorithms in resource-constrained environments

M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …

Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations

E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …

Merkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practice

A Fregly, J Harvey, BS Kaliski Jr, S Sheth - Cryptographers' Track at the …, 2023 - Springer
Abstract We introduce the Merkle Tree Ladder (MTL) mode of operation for signature
schemes. MTL mode signs messages using an underlying signature scheme in such a way …

{DSig}: Breaking the Barrier of Signatures in Data Centers

MK Aguilera, C Burgelin, R Guerraoui, A Murat… - … USENIX Symposium on …, 2024 - usenix.org
Data centers increasingly host mutually distrustful users on shared infrastructure. A powerful
tool to safeguard such users are digital signatures. Digital signatures have revolutionized …

Hash-Based Multi-Signatures for Post-Quantum Ethereum

J Drake, D Khovratovich, M Kudinov… - Cryptology ePrint …, 2025 - eprint.iacr.org
With the threat posed by quantum computers on the horizon, systems like Ethereum must
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …

Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to and XMSS

K Zhang, H Cui, Y Yu - Annual International Cryptology Conference, 2023 - Springer
Hash-based signatures offer a conservative alternative to post-quantum signatures with
arguably better-understood security than other post-quantum candidates. As a core building …

Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

P Tandel, J Nasriwala - Service Oriented Computing and Applications, 2024 - Springer
In today's era, numerous applications are evolving into smart applications by leveraging
technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The …

Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or Signatures

A Wagner, V Wesselkamp, F Oberhansl… - … Conference on Post …, 2023 - Springer
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the
authenticity of data in a post-quantum world. The stateful schemes LMS and XMSS and the …

SDitH in the QROM

C Aguilar-Melchor, A Hülsing, D Joseph… - … Conference on the …, 2023 - Springer
The MPC in the Head (MPCitH) paradigm has recently led to significant improvements for
signatures in the code-based setting. In this paper we consider some modifications to a …

Quantum-resistant blockchain and performance analysis

F Wu, B Zhou, J Song, L **e - The Journal of Supercomputing, 2025 - Springer
Blockchain technology enables secure information and value exchange in untrusted
environments by integrating cryptographic techniques such as public–private key …