{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T01:10:06Z","timestamp":1748567406517,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319221731"},{"type":"electronic","value":"9783319221748"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22174-8_20","type":"book-chapter","created":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T16:28:06Z","timestamp":1439569686000},"page":"366-383","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants"],"prefix":"10.1007","author":[{"given":"Ana Karina D. S.","family":"de Oliveira","sequence":"first","affiliation":[]},{"given":"Julio","family":"L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,15]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. theory 22, 44\u2013654 (1976)","journal-title":"IEEE Trans. Inf. theory"},{"key":"20_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-319-07854-0_68","volume-title":"HCI International 2014 - Posters\u2019 Extended Abstracts","author":"L Bremen","year":"2014","unstructured":"Bremen, L., Kluge, J., Ziefle, M., Modabber, A., Goloborodko, E., H\u00f6lzle, F.: \u201cTwo faces and a hand scan\u201d- pre- and postoperative insights of patients undergoing an orthognathic surgery. In: Stephanidis, C. (ed.) HCI 2014, Part II. CCIS, vol. 435, pp. 389\u2013394. Springer, Heidelberg (2014)"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431\u2013448. Springer, Heidelberg (1999)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45450-0_11","volume-title":"Information Security and Privacy","author":"L Reyzin","year":"2002","unstructured":"Reyzin, L., Reyzin, N.: Better than BiBa: short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144\u2013153. Springer, Heidelberg (2002)"},{"key":"20_CR6","unstructured":"Lamport, L.: Constructing Digital Signatures from a One Way Function Technical report SRI-CSL-98, SRI International Computer Science Laboratory (1979)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/11941378_25","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"J Buchmann","year":"2006","unstructured":"Buchmann, J., Garc\u00eda, L.C.C., Dahmen, E., D\u00f6ring, M., Klintsevich, E.: CMSS \u2013 an improved merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 349\u2013363. Springer, Heidelberg (2006)"},{"key":"20_CR8","unstructured":"NIST.: Digital Signatures Algorithm (DSA). FIPS-186 (1994). http:\/\/www.itl.nist.gov\/fipspubs\/fip186.htm"},{"key":"20_CR9","unstructured":"eBACS: ECRYPT Benchmarking of Cryptographic Systems SUPERCOP 20140924 (2014). http:\/\/hyperelliptic.org\/ebats\/supercop-20140924.tar.bz2"},{"key":"20_CR10","unstructured":"Gosney, J.: The sse2\/xop implementation of sha256 (2013). http:\/\/www.openwall.com\/lists\/john-dev\/2013\/04\/10\/6"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: Elliptic curve digital signature algorithm ECDSA. Int. J. Inf. Secur. 1, 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/3-540-36563-X_21","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M Jakobsson","year":"2003","unstructured":"Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal merkle tree representation and traversal. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 314\u2013326. Springer, Heidelberg (2003)"},{"key":"20_CR13","unstructured":"McGrew, D., Curcio, M.: Hash-Based Signatures draft-mcgrew-hash-sigs-02. Crypto Forum Research Group, Internet Draft, Cisco Systems (2014)"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-88403-3","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2008","unstructured":"Buchmann, J., Dahmen, E., Szydlo, M.: Hash-based digital signature schemes. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 35\u201392. Springer, Heidelberg (2008)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M Szydlo","year":"2004","unstructured":"Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541\u2013554. Springer, Heidelberg (2004)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-72738-5_3","volume-title":"Applied Cryptography and Network Security","author":"J Buchmann","year":"2007","unstructured":"Buchmann, J., Dahmen, E., Klintsevich, E., Okeya, K., Vuillaume, C.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 31\u201345. Springer, Heidelberg (2007)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-88403-3_5","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2008","unstructured":"Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 63\u201378. Springer, Heidelberg (2008)"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-40588-4_14","volume-title":"Security Engineering and Intelligence Informatics","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Rausch, L., Buchmann, J.: Optimal parameters for XMSS $$^\\text{ MT }$$ MT . In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES Workshops 2013. LNCS, vol. 8128, pp. 194\u2013208. Springer, Heidelberg (2013)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, pp. 124\u2013134. IEEE Computer Society Press (1994)","DOI":"10.1007\/3-540-58691-1_68"},{"key":"20_CR20","unstructured":"Practical Forward Secure Signature using Minimal Security Assumptions. Ph.D. thesis. TU Darmstadt, Darmstadt, August 2013"},{"key":"20_CR21","unstructured":"NIST.: Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Computer Security Division - Information Technology Laboratory - NIST Special Publication 800\u201390A (2012). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-90A\/SP800-90A.pdf"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schwabe, P., O\u2019Hearn, Z.: SPHINCS: practical stateless hash-based signatures. Cryptology ePrint Archive - Report 2014\/795 (2014)","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"20_CR23","unstructured":"Merkle, R.C.: Secrecy, Authentication, and Public Key Systems. Stanford Ph.D. thesis (1979)"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011). https:\/\/huelsing.wordpress.com\/publications\/"},{"key":"20_CR25","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S.: XMSS: Extended Hash-Based Signatures draft-xmss-00. Crypto Forum Research Group, Internet Draft (2015)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ \u2013 shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013)"},{"key":"20_CR27","unstructured":"Guilfor, J., Yap, K., Gopal, V.: Fast SHA-256 Implementations on Intel Architecture Processors. IA Architects Intel Corporation (2012). http:\/\/www.intel.com.br\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/sha-256-implementations-paper.pdf"},{"key":"20_CR28","unstructured":"Intel to release first Skylake microprocessors in Q2 2015 (2014). http:\/\/www.kitguru.net\/components\/cpu\/anton-shilov\/intel-to-release-first-skylake-microprocessors-in-q2-2015-says-report"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology -- LATINCRYPT 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22174-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:31:08Z","timestamp":1748565068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-22174-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221731","9783319221748"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22174-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}