ARMed SPHINCS
From MaRDI portal
Publication:2798787
DOI10.1007/978-3-662-49384-7_17zbMath1388.94061OpenAlexW2397429946MaRDI QIDQ2798787
Peter Schwabe, Joost Rijneveld, Andreas Hülsing
Publication date: 13 April 2016
Published in: Public-Key Cryptography – PKC 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49384-7_17
post-quantum cryptographymicrocontrollerhash-based signature schemes\(\text{XMSS}^{MT}\)ARM cortex M3resource-constrained devicesSPHINCS-256
Related Items (4)
An intermediate secret-guessing attack on hash-based signatures ⋮ LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Verifying post-quantum signatures in 8 kB of RAM
Cites Work
- Model predictive control: Theory and practice - a survey
- Policy learning for time-bounded reachability in continuous-time Markov decision processes via doubly-stochastic gradient ascent
- Multilevel Splitting for Estimating Rare Event Probabilities
- Accelerating parallel particle swarm optimization via GPU
- Modeling Bird Flight Formations Using Diffusion Adaptation
- From program verification to program synthesis
- The Convergence of Bird Flocking
- Verification, Model Checking, and Abstract Interpretation
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: ARMed SPHINCS