Recovering the tight security proof of SPHINCS\textsuperscript{+}
DOI10.1007/978-3-031-22972-5_1zbMath1519.94136OpenAlexW4317928275MaRDI QIDQ6133961
Mikhail Kudinov, Andreas Hülsing
Publication date: 21 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22972-5_1
hash functionspost-quantum cryptographyhash-based signaturesundetectabilityPRFSPHINCS\textsuperscript{+}W-OTSWOTS-TW
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Cites Work
- Unnamed Item
- Decisional second-preimage resistance: when does SPR imply PRE?
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- Mitigating Multi-target Attacks in Hash-Based Signatures
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- Cryptography and Coding
- Recovering the tight security proof of SPHINCS\textsuperscript{+}
This page was built for publication: Recovering the tight security proof of SPHINCS\textsuperscript{+}