Post-quantum cryptography

DJ Bernstein, T Lange - Nature, 2017 - nature.com
… This makes Merkle’s very simple signatures excellent candidates for post-quantum
signatures: they have a clear security track record, and computing hash functions is very fast. …

Blockchained post-quantum signatures

K Chalkias, J Brown, M Hearn… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
signature schemes, we propose BPQS, an extensible post-quantum (PQ) resistant digital
signature … and verification costs as well as signature size. Compared to recent improvements in …

[PDF][PDF] Candidate for practical post-quantum signature scheme

NA Moldovyan, AA Moldovyan - 2020 - dspace.spbu.ru
… FNAA used as algebraic support of the signature scheme. Taking into account such …
post-quantum resistance is applied in this paper for the development of a post-quantum signature

A survey on exotic signatures for post-quantum blockchain: Challenges and research directions

M Buser, R Dowsley, M Esgin, C Gritti… - ACM Computing …, 2023 - dl.acm.org
… In Section 4, we first overview the general zero-knowledge proof paradigms used to construct
a large subset of the post-quantum exotic signatures we discuss in this work. Our goal here …

BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

C Cremers, S Düzlü, R Fiedler… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
… In Section V we analyze the finalists to the NIST competition for post-quantum signature
schemes wrt the three security properties beyond unforgeability. We conclude in Section VI. …

Security comparisons and performance analyses of post-quantum signature algorithms

M Raavi, S Wuthier, P Chandramouli… - … Conference on Applied …, 2021 - Springer
post-quantum digital signature algorithms, and Sect. 2 explains the history of the post-quantum
In this section, we discuss more related work to our research, including the post-quantum

Improved non-interactive zero knowledge with applications to post-quantum signatures

J Katz, V Kolesnikov, X Wang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
post-quantum” ring and group signaturespost-quantum” NIZKPoK with shorter proof size
than in prior work. We also explored applications of our work in the context of various signature

To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures

P Pessl, LG Bruinderink, Y Yarom - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
… Finally, we show that cache attacks on post-quantum cryptography are not only possible,
but also … The attack recovers the secret signing key after observing roughly 6 000 signature

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
… of practical post-quantum signature schemes. … signature schemes, we make several
contributions of general interest to zero-knowledge proofs both in the classical and post-quantum

Post-quantum signatures

J Buchmann, C Coronado, M Döring… - Cryptology ePrint …, 2004 - eprint.iacr.org
signature schemes. We have to design, implement and standardize postquantum signature
… In Section 2 we explain the practical relevance of digital signatures for IT-Security today. In …