{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:16:49Z","timestamp":1759331809872,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493830"},{"type":"electronic","value":"9783662493847"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49384-7_17","type":"book-chapter","created":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T00:24:21Z","timestamp":1455927861000},"page":"446-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["ARMed SPHINCS"],"prefix":"10.1007","author":[{"given":"Andreas","family":"H\u00fclsing","sequence":"first","affiliation":[]},{"given":"Joost","family":"Rijneveld","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,18]]},"reference":[{"key":"17_CR1","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE. Submission to NIST (2008). https:\/\/131002.net\/blake\/blake.pdf"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/BFb0052256","volume-title":"Advances in Cryptology \u2014 CRYPTO '97","author":"Mihir Bellare","year":"1997","unstructured":"Bellare, M., Rogaway, P.: Collision-resistant hashing: towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470\u2013484. Springer, Heidelberg (1997). https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/tcr-hash.pdf"},{"key":"17_CR3","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. SASC 2008: the state of the art of stream ciphers, Document ID: 4027b5256e17b9796842e6d0f68b0b5e (2008) http:\/\/cr.yp.to\/papers.html#chacha"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-662-46800-5_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"DJ Bernstein","year":"2015","unstructured":"Bernstein, D.J., et al.: SPHINCS: practical stateless hash-based signatures. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 368\u2013397. Springer, Heidelberg (2015). http:\/\/cryptojedi.org\/papers\/#sphincs"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011). https:\/\/huelsing.files.wordpress.com\/2013\/05\/mssgesamt.pdf"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-72738-5_3","volume-title":"Applied Cryptography and Network Security","author":"J Buchmann","year":"2007","unstructured":"Buchmann, J., Dahmen, E., Klintsevich, E., Okeya, K., Vuillaume, C.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 31\u201345. Springer, Heidelberg (2007)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-88403-3_5","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2008","unstructured":"Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 63\u201378. Springer, Heidelberg (2008). https:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/reports\/AuthPath.pdf"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-35999-6_5","volume-title":"Selected Areas in Cryptography","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Busold, C., Buchmann, J.: Forward secure signatures on smart cards. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 66\u201380. Springer, Heidelberg (2013). https:\/\/huelsing.files.wordpress.com\/2013\/05\/xmss-smart.pdf"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-88403-3_8","volume-title":"Post-Quantum Cryptography","author":"Erik Dahmen","year":"2008","unstructured":"Dahmen, E., Okeya, K., Takagi, T., Vuillaume, C.: Digital signatures out of second-preimage resistant hash functions. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 109\u2013123. Springer, Heidelberg (2008). https:\/\/www.cdc.informatik.tu-darmstadt.de\/~dahmen\/papers\/DOTV08.pdf"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-662-43414-7_12","volume-title":"Selected Areas in Cryptography -- SAC 2013","author":"Thomas Eisenbarth","year":"2014","unstructured":"Eisenbarth, T., von Maurich, I., Ye, X.: Faster hash-based signatures with bounded leakage. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 223\u2013244. Springer, Heidelberg (2014). http:\/\/users.wpi.edu\/~teisenbarth\/pdf\/SignatureswithBoundedLeakageSAC.pdf"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-47721-7_8","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"O Goldreich","year":"1987","unstructured":"Goldreich, O.: Two remarks concerning the Goldwasser-Micali-Rivest signature scheme. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 104\u2013110. Springer, Heidelberg (1987). http:\/\/theory.csail.mit.edu\/ftp-data\/pub\/people\/oded\/gmr.ps"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-642-33027-8_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"T G\u00fcneysu","year":"2012","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Practical lattice-based cryptography: a signature scheme for embedded systems. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 530\u2013547. Springer, Heidelberg (2012). https:\/\/www.sha.rub.de\/media\/sh\/veroeffentlichungen\/2014\/06\/12\/lattice_signature.pdf"},{"key":"17_CR13","unstructured":"H\u00fclsing, A.: Practical Forward Secure Signatures Using Minimal Security Assumptions. Ph.D. thesis, TU Darmstadt (2013). http:\/\/tuprints.ulb.tu-darmstadt.de\/3651\/"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ \u2013 shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013). https:\/\/huelsing.files.wordpress.com\/2013\/05\/wotsspr.pdf"},{"key":"17_CR15","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S., Mohaisen, A.: XMSS: extended hash-based signatures draft-irtf-cfrg-xmss-hash-based-signatures-01. Crypto Forum Research Group Internet-Draft (2015). https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-xmss-hash-based-signatures-01"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-40588-4_14","volume-title":"Security Engineering and Intelligence Informatics","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Rausch, L., Buchmann, J.: Optimal parameters for XMSS\n$$^{\\mathit{MT}}$$\n. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES Workshops 2013. LNCS, vol. 8128, pp. 194\u2013208. Springer, Heidelberg (2013). https:\/\/huelsing.files.wordpress.com\/2013\/04\/xmss-optimal.pdf"},{"key":"17_CR17","unstructured":"Lamport, L.: Constructing digital signatures from a one way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (1979)"},{"key":"17_CR18","unstructured":"ARM Limited. ARMv6-M Architecture Reference Manual. Document ID: ARM DDI0419C. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0419c\/"},{"key":"17_CR19","unstructured":"ARM Limited. ARMv7-M Architecture Reference Manual. Document ID: ARM DDI0403E.B. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0403e.b\/"},{"key":"17_CR20","unstructured":"ARM Limited. Cortex-m0 processor \u2013 ARM. http:\/\/www.arm.com\/products\/processors\/cortex-m\/cortex-m0.php"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990). http:\/\/www.merkle.com\/papers\/Certified1979.pdf"},{"key":"17_CR22","unstructured":"Oder, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Beyond ECDSA and RSA: lattice-based digital signatures on constrained devices. In: Design Automation Conference \u2013 DAC 2014, pp. 1\u20136. ACM (2014). https:\/\/www.sha.rub.de\/media\/attachments\/files\/2014\/06\/bliss_arm.pdf"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45450-0_11","volume-title":"Information Security and Privacy","author":"Leonid Reyzin","year":"2002","unstructured":"Reyzin, L., Reyzin, N.: Better than BiBa: short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144\u2013153. Springer, Heidelberg (2002). http:\/\/www.cs.bu.edu\/~reyzin\/papers\/one-time-sigs.pdf"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-85893-5_8","volume-title":"Smart Card Research and Advanced Applications","author":"S Rohde","year":"2008","unstructured":"Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C.: Fast hash-based signatures on constrained devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 104\u2013117. Springer, Heidelberg (2008). https:\/\/www-old.cdc.informatik.tu-darmstadt.de\/reports\/reports\/REDBP08.pdf"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11734666_7","volume-title":"Security in Pervasive Computing","author":"B-Y Yang","year":"2006","unstructured":"Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing minimized multivariate PKC on low-resource embedded systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 73\u201388. Springer, Heidelberg (2006). http:\/\/precision.moscito.org\/by-publ\/recent\/39340073.pdf"}],"container-title":["Lecture Notes in Computer Science","Public-Key Cryptography \u2013 PKC 2016"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49384-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T14:42:43Z","timestamp":1612449763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49384-7_17"}},"subtitle":["Computing a 41\u00a0KB Signature in 16\u00a0KB of RAM"],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493830","9783662493847"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49384-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 February 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}