Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)

@article{Atkins2021UseOT,
  title={Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)},
  author={Derek Atkins},
  journal={RFC},
  year={2021},
  volume={9021},
  pages={1-11}
}
This document specifies the conventions for using the Walnut Digital Signature Algorithm (WalnutDSA) for digital signatures with the CBOR Object Signing and Encryption (COSE) syntax. WalnutDSA is a lightweight, quantum-resistant signature scheme based on Group Theoretic Cryptography (see [WALNUTDSA] and [WALNUTSPEC]) with implementation and computational efficiency of signature verification in constrained environments, even on 8- and 16-bit platforms. 

References

SHOWING 1-10 OF 13 REFERENCES
CBOR Object Signing and Encryption (COSE)
TLDR
This document defines the CBOR Object Signing and Encryption (COSE) protocol, which describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
The Walnut Digital Signature Algorithm (WalnutDSA) brings together methods in group theory, representation theory, and number theory, to yield a public-key method that provides a means for messages
Introduction to post-quantum cryptography
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a frontpage article reporting that all of the
Randomness Requirements for Security
TLDR
This document recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose and provides suggestions to ameliorate the problem when a hardware solution is not available.
THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE
TLDR
The latest breakthroughs in the academic cryptography community are explained and what practical issues could arise for popular cryptosystems are looked ahead at, and the many obvious and hidden uses of RSA and related algorithms are pointed out.
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
  • P. Shor
  • Computer Science
    SIAM Rev.
  • 1999
TLDR
Efficient randomized algorithms are given for factoring integers and finding discrete logarithms, two problems that are generally thought to be hard on classical computers and that have been used as the basis of several proposed cryptosystems.
Group Theoretic Cryptography
TLDR
The book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES, and supplies formal security analyses and highlights potential vulnerabilities for cryptography constructions involving group theory.
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
TLDR
This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.
Secure Hash Standard (SHS
    ...
    ...