An overview of hash based signatures

V Srivastava, A Baksi, SK Debnath - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Digital signatures are one of the most basic cryptographic building blocks which are utilized
to provide attractive security features like authenticity, unforgeability, and undeniability. The …

Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations

E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …

CUSPX: Efficient GPU Implementations of Post-Quantum Signature SPHINCS+

Z Wang, X Dong, H Chen, Y Kang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Quantum computers pose a serious threat to existing cryptographic systems. While Post-
Quantum Cryptography (PQC) offers resilience against quantum attacks, its performance …

Efficient GPU implementations of post-quantum signature XMSS

Z Wang, X Dong, H Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) approved XMSS as part of the
post-quantum cryptography (PQC) development effort in 2018. XMSS is currently one of only …

An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU

Z Wang, X Dong, Y Kang, H Chen… - ACM Transactions on …, 2024 - dl.acm.org
The hash-based signature (HBS) is the most conservative and time-consuming among many
post-quantum cryptography (PQC) algorithms. Two HBSs, LMS and XMSS, are the only PQC …

Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments

H Choi, SJ Choi, SC Seo - Electronics, 2024 - mdpi.com
Currently, cryptographic hash functions are widely used in various applications, including
message authentication codes, cryptographic random generators, digital signatures, key …

A Survey on NIST 3rd Round Post Quantum Digital Signature Algorithms

R Shajahan, K Jain, P Krishnan - 2024 5th International …, 2024 - ieeexplore.ieee.org
Currently, digital signature techniques used in public key infrastructure are based on
challenges such as discrete logarithms and integer factorization. The introduction of …

Drop-In-Replaceability Analysis using Post Quantum Cryptography Algorithms

KS Shailesh, SC Hiremath… - 2023 Fourth …, 2023 - ieeexplore.ieee.org
Quantum-resistant cryptographic techniques refer to encryption and decryption methods
crafted to resist potential attacks from quantum computers. Quantum computers, or QCs …

An Evaluation of Hashing and Other Applied Cryptography Algorithms

A Mishra, Haripriya, A Sharma, JS Thomas - International Conference on …, 2023 - Springer
In the modern digital world, cryptography is critical in protecting personal statistics. Most of
the cryptography algorithms used to ease data, hashing, and other implemented …

О МЕТОДАХ ПРОЕКТИРОВАНИЯ ПОСТКВАНТОВОГО КРИПТОГРАФИЧЕСКОГО АЛГОРИТМА ЭЛЕКТРОННОЙ ЦИФРОВОЙ ПОДПИСИ

Р Оспанов, Е Сейткулов, К Утебаев… - Вестник …, 2024 - vestnik.alt.edu.kz
Аннотация Данная работа посвящена методам проектирования постквантового
криптографического алгоритма электронной цифровой подписи. Существуют …