Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Mitigating Multi-target Attacks in Hash-Based Signatures - MaRDI portal

Mitigating Multi-target Attacks in Hash-Based Signatures

From MaRDI portal
Publication:2798784

DOI10.1007/978-3-662-49384-7_15zbMath1388.94092OpenAlexW2294833833MaRDI QIDQ2798784

Andreas Hülsing, Fang Song, Joost Rijneveld

Publication date: 13 April 2016

Published in: Public-Key Cryptography – PKC 2016 (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/2066/155749




Related Items (26)

On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessA Note on the Instantiability of the Quantum Random OracleEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsAn intermediate secret-guessing attack on hash-based signaturesHash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message SecurityClassical proofs for the quantum collapsing property of classical hash functions\textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature schemeSecurity analysis of DGM and GM group signature schemes instantiated with XMSS-TSecurity analysis of the W-OTS$^+$ signature scheme: Updating security boundsMerkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practiceThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsGroup action key encapsulation and non-interactive key exchange in the QROMRecovering the tight security proof of SPHINCS\textsuperscript{+}Tight adaptive reprogramming in the QROMMachine-checked security for XMSS as in RFC 8391 and SPHINCS\textsuperscript{+}On the security of the WOTS-PRF signature schemePublic key compression for constrained linear signature schemesLeighton-Micali hash-based signatures in the quantum random-oracle model``Oops, I did it again -- security of one-time signatures under two-message attacksLow-communication parallel quantum multi-target preimage searchLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Generic authenticated key exchange in the quantum random oracle modelQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelOn subset-resilient hash function familiesW-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets



Cites Work




This page was built for publication: Mitigating Multi-target Attacks in Hash-Based Signatures