Author:
Panthi Swarna,Bhuyan Bubu
Publisher
Springer Nature Singapore
Reference23 articles.
1. Becker G (2008) Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum Tech Rep 12:19
2. Bernstein DJ, Hopwood D, Hülsing A, Lange T, Niederhagen R, Papachristodoulou L, Schneider M, Schwabe P, Wilcox-O’Hearn Z (2015) Sphincs: practical stateless hash-based signatures. In: Advances in cryptology—EUROCRYPT 2015: 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015, Proceedings, Part I 34. pp 368–397. Springer
3. Bernstein DJ, Hülsing A, Kölbl S, Niederhagen R, Rijneveld J, Schwabe P (2019) The sphincs+ signature framework. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 2129–2146
4. Buchanan W, Woodward A (2017) Will quantum computers be the end of public key encryption? J Cyber Secur Technol 1(1):1–22
5. Buchmann J, Coronado C, Döring M, Engelbert D, Ludwig C, Overbeck R, Schmidt A, Vollmer U, Weinmann RP (2004) Post-quantum signatures. Cryptology ePrint Archive