Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)
@article{Atkins2021UseOT, title={Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)}, author={Derek Atkins}, journal={RFC}, year={2021}, volume={9021}, pages={1-11} }
This document specifies the conventions for using the Walnut Digital
Signature Algorithm (WalnutDSA) for digital signatures with the CBOR
Object Signing and Encryption (COSE) syntax. WalnutDSA is a
lightweight, quantum-resistant signature scheme based on Group
Theoretic Cryptography (see [WALNUTDSA] and [WALNUTSPEC]) with
implementation and computational efficiency of signature verification
in constrained environments, even on 8- and 16-bit platforms.
References
SHOWING 1-10 OF 13 REFERENCES
CBOR Object Signing and Encryption (COSE)
- Computer ScienceRFC
- 2017
This document defines the CBOR Object Signing and Encryption (COSE) protocol, which describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2019
The Walnut Digital Signature Algorithm (WalnutDSA) brings together methods in group theory, representation theory, and number theory, to yield a public-key method that provides a means for messages…
Introduction to post-quantum cryptography
- Computer Science
- 2009
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a frontpage article reporting that all of the…
Randomness Requirements for Security
- Computer ScienceRFC
- 2005
This document recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose and provides suggestions to ameliorate the problem when a hardware solution is not available.
THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE
- Computer Science
- 2014
The latest breakthroughs in the academic cryptography community are explained and what practical issues could arise for popular cryptosystems are looked ahead at, and the many obvious and hidden uses of RSA and related algorithms are pointed out.
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Computer ScienceSIAM Rev.
- 1999
Efficient randomized algorithms are given for factoring integers and finding discrete logarithms, two problems that are generally thought to be hard on classical computers and that have been used as the basis of several proposed cryptosystems.
Group Theoretic Cryptography
- Computer Science, MathematicsChapman and Hall / CRC cryptography and network security series
- 2015
The book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES, and supplies formal security analyses and highlights potential vulnerabilities for cryptography constructions involving group theory.
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
- Business, EconomicsRFC
- 2017
This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.
Secure Hash Standard (SHS