]> Cypherpunks repositories - keks.git/commit
Do randomised SPHINCS+ signatures
authorSergey Matveev <stargrave@stargrave.org>
Thu, 17 Apr 2025 08:12:31 +0000 (11:12 +0300)
committerSergey Matveev <stargrave@stargrave.org>
Thu, 17 Apr 2025 08:19:50 +0000 (11:19 +0300)
commit2624033f73cc69f1b3760775b8138ef4f88df742061d7b69e0e66d9779ac2b82
tree73b38a95d063f940aefd614af5095a48636a0877f4bcf7fda8732f523383e72f
parentaae03bb52237329dbfaee2b1ad4ca1ecfd88691c64f7ae027921b4735ca2c474
Do randomised SPHINCS+ signatures

Unlike classical signature schemes like ECDSA, here entropy is only used
for randomisation. Even if low quality PRNG is in use, even if it is
constant, it has no security drawbacks on private key leakage (except
for side-channel attacks). ECDSA/GOST 34.10 can be completely compromised
with bad PRNGs.
go/cm/hash/algo.go
go/cm/hash/shake.go
go/cm/sign/pub.go
go/cm/sign/spx/kp.go
go/cm/sign/spx/signer.go
spec/cm/signed.texi