An overview of hash based signatures
Digital signatures are one of the most basic cryptographic building blocks which are utilized
to provide attractive security features like authenticity, unforgeability, and undeniability. The …
to provide attractive security features like authenticity, unforgeability, and undeniability. The …
Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
CUSPX: Efficient GPU Implementations of Post-Quantum Signature SPHINCS+
Z Wang, X Dong, H Chen, Y Kang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Quantum computers pose a serious threat to existing cryptographic systems. While Post-
Quantum Cryptography (PQC) offers resilience against quantum attacks, its performance …
Quantum Cryptography (PQC) offers resilience against quantum attacks, its performance …
Efficient GPU implementations of post-quantum signature XMSS
Z Wang, X Dong, H Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) approved XMSS as part of the
post-quantum cryptography (PQC) development effort in 2018. XMSS is currently one of only …
post-quantum cryptography (PQC) development effort in 2018. XMSS is currently one of only …
An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU
Z Wang, X Dong, Y Kang, H Chen… - ACM Transactions on …, 2024 - dl.acm.org
The hash-based signature (HBS) is the most conservative and time-consuming among many
post-quantum cryptography (PQC) algorithms. Two HBSs, LMS and XMSS, are the only PQC …
post-quantum cryptography (PQC) algorithms. Two HBSs, LMS and XMSS, are the only PQC …
Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments
H Choi, SJ Choi, SC Seo - Electronics, 2024 - mdpi.com
Currently, cryptographic hash functions are widely used in various applications, including
message authentication codes, cryptographic random generators, digital signatures, key …
message authentication codes, cryptographic random generators, digital signatures, key …
A Survey on NIST 3rd Round Post Quantum Digital Signature Algorithms
Currently, digital signature techniques used in public key infrastructure are based on
challenges such as discrete logarithms and integer factorization. The introduction of …
challenges such as discrete logarithms and integer factorization. The introduction of …
Drop-In-Replaceability Analysis using Post Quantum Cryptography Algorithms
KS Shailesh, SC Hiremath… - 2023 Fourth …, 2023 - ieeexplore.ieee.org
Quantum-resistant cryptographic techniques refer to encryption and decryption methods
crafted to resist potential attacks from quantum computers. Quantum computers, or QCs …
crafted to resist potential attacks from quantum computers. Quantum computers, or QCs …
An Evaluation of Hashing and Other Applied Cryptography Algorithms
A Mishra, Haripriya, A Sharma, JS Thomas - International Conference on …, 2023 - Springer
In the modern digital world, cryptography is critical in protecting personal statistics. Most of
the cryptography algorithms used to ease data, hashing, and other implemented …
the cryptography algorithms used to ease data, hashing, and other implemented …
[PDF][PDF] Drop-In-Replaceability Analysis using Post Quantum Cryptography Algorithms
P Thanmai Sai, N Ramakrishnan, KS Shailesh, A Ali… - researchgate.net
Quantum-resistant cryptographic techniques refer to encryption and decryption methods
crafted to resist potential attacks from quantum computers. Quantum computers, or QCs …
crafted to resist potential attacks from quantum computers. Quantum computers, or QCs …