XMSS

Results: 7



#Item
1Cryptography / Power analysis / XMSS / Side-channel attack / DPA / SHA-2 / Post-quantum cryptography

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer Juliane Kr¨amer Aymeric Genˆet Denis Butin

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-03-15 13:22:57
2Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / XMSS / HMAC / SHA-2 / Hash function / Crypt / Hash-based cryptography

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Full paper available at kannwischer.eu

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-11 11:26:21
3Cryptography / Hashing / Post-quantum cryptography / Digital Signature Standard / Cryptographic hash functions / HMAC / XMSS / SHA-2 / Hash function / Hash-based cryptography / Digital Signature Algorithm / BLAKE

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer Aymeric Genêt Denis Butin, Juliane Krämer,

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-11 11:29:02
4Cryptography / Post-quantum cryptography / Public-key cryptography / XMSS / Elliptic curve cryptography / Power analysis / Hash function / Elliptic-curve DiffieHellman / Hash-based cryptography

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer Juliane Kr¨amer Aymeric Genˆet Denis Butin

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-22 20:50:40
5Cryptography / Post-quantum cryptography / Public-key cryptography / XMSS / Power analysis / Random number generation / Side-channel attack / Cryptographic hash function / Quantum cryptography / RSA / Digital signature / Pseudorandom number generator

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer 16 April 2018 CRYPTACUS Training School,

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-09 08:49:55
6Cryptography / Cryptographic hash functions / Hashing / Post-quantum cryptography / Search algorithms / XMSS / HMAC / SHA-2 / Hash function / Hash-based cryptography / Digital Signature Algorithm / SHA-3

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer1,2 , Aymeric Genêt3,4 , Denis Butin1 , Juliane Krämer1 , and Johannes Buchmann1 1

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-02-15 04:52:24
7Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-08 10:22:54
UPDATE