{"id":"https://openalex.org/W2172273481","doi":"https://doi.org/10.1007/978-3-662-46800-5_15","title":"SPHINCS: Practical Stateless Hash-Based Signatures","display_name":"SPHINCS: Practical Stateless Hash-Based Signatures","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2172273481","doi":"https://doi.org/10.1007/978-3-662-46800-5_15","mag":"2172273481"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-46800-5_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-46800-5_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-46800-5_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-46800-5_15.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108114375","display_name":"Daniel J. Bernstein","orcid":null},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]},{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL","US"],"is_corresponding":true,"raw_author_name":"Daniel J. Bernstein","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607\u20137045, USA","Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607\u20137045, USA","institution_ids":["https://openalex.org/I39422238"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058301239","display_name":"D. Hopwood","orcid":"https://orcid.org/0009-0006-8932-7094"},"institutions":[{"id":"https://openalex.org/I4210144946","display_name":"Applied Research Associates (United States)","ror":"https://ror.org/04vpnmr86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210144946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daira Hopwood","raw_affiliation_strings":["Least Authority, 3450 Emerson Ave., Boulder, CO, 80305\u20136452, USA"],"affiliations":[{"raw_affiliation_string":"Least Authority, 3450 Emerson Ave., Boulder, CO, 80305\u20136452, USA","institution_ids":["https://openalex.org/I4210144946"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065527777","display_name":"Andreas H\u00fclsing","orcid":"https://orcid.org/0000-0003-2215-4134"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Andreas H\u00fclsing","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016164029","display_name":"Tanja Lange","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tanja Lange","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050032178","display_name":"Ruben Niederhagen","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ruben Niederhagen","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028204202","display_name":"Louiza Papachristodoulou","orcid":null},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Louiza Papachristodoulou","raw_affiliation_strings":["Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085428799","display_name":"Michael Schneider","orcid":"https://orcid.org/0000-0002-4203-8926"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Schneider","raw_affiliation_strings":["Research not related to TU/e workplace (outside TU/e employment)"],"affiliations":[{"raw_affiliation_string":"Research not related to TU/e workplace (outside TU/e employment)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074344027","display_name":"Peter Schwabe","orcid":"https://orcid.org/0000-0002-1310-0997"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Peter Schwabe","raw_affiliation_strings":["Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054502939","display_name":"Zooko Wilcox-O\u2019Hearn","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144946","display_name":"Applied Research Associates (United States)","ror":"https://ror.org/04vpnmr86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210144946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zooko Wilcox-O\u2019Hearn","raw_affiliation_strings":["Least Authority, 3450 Emerson Ave., Boulder, CO, 80305\u20136452, USA"],"affiliations":[{"raw_affiliation_string":"Least Authority, 3450 Emerson Ave., Boulder, CO, 80305\u20136452, USA","institution_ids":["https://openalex.org/I4210144946"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5108114375"],"corresponding_institution_ids":["https://openalex.org/I39422238","https://openalex.org/I83019370"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":30.004,"has_fulltext":true,"cited_by_count":359,"citation_normalized_percentile":{"value":0.99849974,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"368","last_page":"397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.9222797155380249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784391462802887},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7706232666969299},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.6755480766296387},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6113905906677246},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.5144824981689453},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.4949323534965515},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.491117924451828},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4830935001373291},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.44912081956863403},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3796085715293884},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3489878475666046},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3442940413951874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32557207345962524},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.18358349800109863},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0944049060344696},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09125325083732605}],"concepts":[{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.9222797155380249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784391462802887},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7706232666969299},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.6755480766296387},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6113905906677246},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.5144824981689453},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.4949323534965515},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.491117924451828},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4830935001373291},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.44912081956863403},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3796085715293884},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3489878475666046},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3442940413951874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32557207345962524},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.18358349800109863},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0944049060344696},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09125325083732605},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-662-46800-5_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-46800-5_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-46800-5_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:openaire/e9a5800f-7451-4bdb-816f-25b107d7d247","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/e9a5800f-7451-4bdb-816f-25b107d7d247","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bernstein, D J, Hopwood, D, H\u00fclsing, A T, Lange, T, Niederhagen, R F, Papachristodoulou, L, Schwabe, P & Wilcox O'Hearn, Z 2015, SPHINCS : practical stateless hash-based signatures. in E Oswald & M Fischlin (eds), Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Lecture Notes in Computer Science, vol. 9056, Springer, Berlin, pp. 368-397, 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2015), Sofia, Bulgaria, 26/04/15. https://doi.org/10.1007/978-3-662-46800-5_15","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/141401","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/141401","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Cryptology ; Part I, 368 - 397. Berlin : Springer","raw_type":"info:eu-repo/semantics/bookpart"},{"id":"pmh:tue:oai:pure.tue.nl:publications/e9a5800f-7451-4bdb-816f-25b107d7d247","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/e9a5800f-7451-4bdb-816f-25b107d7d247","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I), 368 - 397","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"doi:10.1007/978-3-662-46800-5_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-46800-5_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-46800-5_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2172273481.pdf","grobid_xml":"https://content.openalex.org/works/W2172273481.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W106528892","https://openalex.org/W115629558","https://openalex.org/W1484827885","https://openalex.org/W1496476314","https://openalex.org/W1499410213","https://openalex.org/W1512372863","https://openalex.org/W1518716055","https://openalex.org/W1548880861","https://openalex.org/W1566345534","https://openalex.org/W1577801461","https://openalex.org/W1596361653","https://openalex.org/W1600113341","https://openalex.org/W1747618102","https://openalex.org/W1778221050","https://openalex.org/W1810232834","https://openalex.org/W1826530159","https://openalex.org/W1850704191","https://openalex.org/W1882598960","https://openalex.org/W2013623332","https://openalex.org/W2064939672","https://openalex.org/W2085797166","https://openalex.org/W2127892706","https://openalex.org/W2131489800","https://openalex.org/W2139566678","https://openalex.org/W2151413173","https://openalex.org/W2900370870","https://openalex.org/W2970480812","https://openalex.org/W3030772204","https://openalex.org/W3159346169"],"related_works":["https://openalex.org/W4200497776","https://openalex.org/W2342330140","https://openalex.org/W2121212096","https://openalex.org/W1663728611","https://openalex.org/W2170400499","https://openalex.org/W2182775338","https://openalex.org/W2953230668","https://openalex.org/W2509647301","https://openalex.org/W2103190493","https://openalex.org/W79931031"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"a":[3,18,69],"high-security":[4],"post-quantum":[5],"stateless":[6],"hash-based":[7,58],"signature":[8,40,61,74],"scheme":[9,41,62],"that":[10],"signs":[11],"hundreds":[12],"of":[13],"messages":[14],"per":[15],"second":[16],"on":[17],"modern":[19],"4-core":[20],"3.5GHz":[21],"Intel":[22],"CPU.":[23],"Signatures":[24],"are":[25,30,36],"41":[26],"KB,":[27,32],"public":[28],"keys":[29,35],"1":[31,37],"and":[33],"private":[34],"KB.":[38],"The":[39],"is":[42,63],"designed":[43],"to":[44,67],"provide":[45],"long-term":[46],"$$2^{128}$$":[47],"security":[48],"even":[49],"against":[50],"attackers":[51],"equipped":[52],"with":[53],"quantum":[54],"computers.":[55],"Unlike":[56],"most":[57],"designs,":[59],"this":[60],"stateless,":[64],"allowing":[65],"it":[66],"be":[68],"drop-in":[70],"replacement":[71],"for":[72],"current":[73],"schemes.":[75]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":42},{"year":2024,"cited_by_count":33},{"year":2023,"cited_by_count":29},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":44},{"year":2020,"cited_by_count":53},{"year":2019,"cited_by_count":41},{"year":2018,"cited_by_count":33},{"year":2017,"cited_by_count":34},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":7}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
