{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T07:26:16Z","timestamp":1775633176898,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T00:00:00Z","timestamp":1716595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T00:00:00Z","timestamp":1716595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00520-6","type":"journal-article","created":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T05:01:31Z","timestamp":1716613291000},"page":"455-483","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Hypericum: a post-quantum digital signature for standardization in Russia"],"prefix":"10.1007","volume":"20","author":[{"given":"Oleg","family":"Turchenko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9482-1939","authenticated-orcid":false,"given":"Sergey","family":"Grebnev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,25]]},"reference":[{"key":"520_CR1","doi-asserted-by":"publisher","unstructured":"Huelsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle signature scheme. RFC 8391 (2018). https:\/\/doi.org\/10.17487\/RFC8391. https:\/\/www.rfc-editor.org\/info\/rfc8391","DOI":"10.17487\/RFC8391"},{"key":"520_CR2","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., Wilcox-O\u2019Hearn, Z.: SPHINCS: practical stateless hash-based signatures (2015). https:\/\/doi.org\/10.1007\/978-3-662-4","DOI":"10.1007\/978-3-662-4"},{"key":"520_CR3","unstructured":"Aumasson, J.-P., Bernstein, D.J., Beullens, W., Dobraunig, C., Eichlseder, M.: SPHINCS+\u2014submission to the 3rd round of the NIST post-quantum project. v3.1 (2022). https:\/\/sphincs.org\/data\/sphincs+-r3.1-specification.pdf"},{"key":"520_CR4","unstructured":"Kudinov, M.A., Kiktenko, E.O., Fedorov, A.K.: Security analysis of the WOTS+ signature scheme: updating security bounds (2020). arXiv:2002.07419"},{"key":"520_CR5","unstructured":"H\u00fclsing, A., Kudinov, M.: Recovering the tight security proof of $$SPHINCS^{+}$$. Cryptology ePrint archive, paper 2022\/346 (2022). https:\/\/eprint.iacr.org\/2022\/346"},{"key":"520_CR6","unstructured":"Technical Committee 26 \u00abCryptography and security mechanisms\u00bb: GOST 34.11-2018. Information technology. Cryptographic data security. Hash-function (2018). https:\/\/docs.cntd.ru\/document\/1200161707"},{"key":"520_CR7","doi-asserted-by":"crossref","unstructured":"Kiktenko, E.O., Bulychev, A.A., Karagodin, P.A., Pozhar, N.O., Anufriev, M.N., Fedorov, A.K.: SPHINCS+ post-quantum digital signature scheme with Streebog hash function. In: AIP Conference Proceedings, vol. 2241, nol. 1, pp. 020014 (2020)","DOI":"10.1063\/5.0011441"},{"key":"520_CR8","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201919, pp. 2129\u20132146. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363229","DOI":"10.1145\/3319535.3363229"},{"key":"520_CR9","unstructured":"Kudinov, M., H\u00fclsing, A., Ronen, E., Yogev, E.: SPHINCS+C: Compressing SPHINCS+ with (almost) no cost. Cryptology ePrint archive, paper 2022\/778 (2022). https:\/\/eprint.iacr.org\/2022\/778"},{"key":"520_CR10","unstructured":"Technical Committee 26 \u00abCryptography and security mechanisms\u00bb: Information technology. Cryptographic data security. Cryptographic algorithms to accompany the usage of digital signature and hash function algorithms (2016). https:\/\/tc26.ru\/standard\/rs\/%D0%A0%2050.1.113-2016.pdf"},{"key":"520_CR11","unstructured":"Kiryukhin, V.: Keyed Streebog is a secure PRF and MAC. Cryptology ePrint archive, paper 2022\/972 (2022). https:\/\/eprint.iacr.org\/2022\/972"},{"key":"520_CR12","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-662-49384-7_15","volume-title":"Public-Key Cryptography\u2013PKC 2016","author":"A H\u00fclsing","year":"2016","unstructured":"H\u00fclsing, A., Rijneveld, J., Song, F.: Mitigating multi-target attacks in hash-based signatures. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) Public-Key Cryptography\u2013PKC 2016, pp. 387\u2013416. Springer, Berlin, Heidelberg (2016)"},{"issue":"5","key":"520_CR13","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1080\/00150517.1976.12430523","volume":"14","author":"M Abramson","year":"1976","unstructured":"Abramson, M.: Restricted combinations and compositions. Fibonacci Q. 14(5), 439\u2013452 (1976)","journal-title":"Fibonacci Q."},{"key":"520_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-40588-4_14","volume-title":"Security Engineering and Intelligence Informatics","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Rausch, L., Buchmann, J.: Optimal parameters for XMSS$$^{{\\rm MT}}$$. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) Security Engineering and Intelligence Informatics, pp. 194\u2013208. Springer, Berlin, Heidelberg (2013)"},{"key":"520_CR15","unstructured":"Kiryukhin, V.: Related-key attacks on the compression function of Streebog. Cryptology ePrint archive, paper 2022\/970 (2022). https:\/\/eprint.iacr.org\/2022\/970"},{"key":"520_CR16","doi-asserted-by":"crossref","unstructured":"Hua, J., Dong, X., Sun, S., Zhang, Z., Hu, L., Wang, X.: Improved MITM cryptanalysis on Streebog. Cryptology ePrint archive, paper 2022\/568 (2022). https:\/\/eprint.iacr.org\/2022\/568","DOI":"10.46586\/tosc.v2022.i2.63-91"},{"key":"520_CR17","unstructured":"Akhmetzyanova, L., Babueva, A., Bozhko, A.: Streebog as a random oracle. Cryptology ePrint archive, paper 2023\/1075 (2023). https:\/\/eprint.iacr.org\/2023\/1075. https:\/\/eprint.iacr.org\/2023\/1075"},{"key":"520_CR18","unstructured":"Kiryukhin, V.: About \u201c$$k$$-bit security\u201d of MACs based on hash function Streebog. Cryptology ePrint archive, paper 2023\/1305 (2023). https:\/\/eprint.iacr.org\/2023\/1305. https:\/\/eprint.iacr.org\/2023\/1305"},{"key":"520_CR19","doi-asserted-by":"publisher","unstructured":"Sergeev, A., Kiryukhin, V.: O stoikisti kluchevih hash funkciy, osnovanih na gost\u00a034.11-2018 (\u00abstreebog\u00bb), k atakam na klyuch [in russian]. Prikl. Diskr. Mat. Suppl. (16), 96\u201398 (2023) https:\/\/doi.org\/10.17223\/2226308X\/16\/24. [On the security of key hash functions based on GOST\u00a034.11-2018 (\u00abStreebog\u00bb) to attacks on the key]","DOI":"10.17223\/2226308X\/16\/24"},{"key":"520_CR20","doi-asserted-by":"crossref","unstructured":"Guo, J., Jean, J., Leurent, G., Peyrin, T., Wang, L.: The usage of counter revisited: second-preimage attack on new Russian standardized hash function. Cryptology ePrint archive, paper 2014\/675 (2014). https:\/\/eprint.iacr.org\/2014\/675","DOI":"10.1007\/978-3-319-13051-4_12"},{"key":"520_CR21","unstructured":"Kelsey, J., Kohno, T.: Herding hash functions and the Nostradamus attack. Cryptology ePrint archive, paper 2005\/281 (2005). https:\/\/eprint.iacr.org\/2005\/281"},{"key":"520_CR22","doi-asserted-by":"crossref","unstructured":"Perlner, R., Kelsey, J., Cooper, D.: Breaking category five SPHINCS+ with SHA-256. Cryptology ePrint archive, paper 2022\/1061 (2022). https:\/\/eprint.iacr.org\/2022\/1061","DOI":"10.1007\/978-3-031-17234-2_23"},{"key":"520_CR23","unstructured":"Vysotskaya, V., Chizhov, I.: The security of the code-based signature scheme based on the Stern identification protocol. Cryptology ePrint archive, paper 2021\/1075 (2021). https:\/\/eprint.iacr.org\/2021\/1075"},{"key":"520_CR24","doi-asserted-by":"crossref","unstructured":"Kirshanova, E.A., Kolesnikov, N.S., Malygina, E.S., Novoselov, S.A.: Post-quantum signature proposal for standardisation. Prikl. Diskr. Mat. Suppl. 13, 44\u201351 (2020)","DOI":"10.17223\/2226308X\/13\/14"},{"key":"520_CR25","doi-asserted-by":"publisher","unstructured":"Bernstein, D., H\u00fclsing, A.: Decisional second-preimage resistance: When does SPR imply PRE?, pp. 33\u201362 (2019). https:\/\/doi.org\/10.1007\/978-3-030-34618-8_2","DOI":"10.1007\/978-3-030-34618-8_2"},{"key":"520_CR26","doi-asserted-by":"publisher","unstructured":"Xagawa, K., Yamakawa, T.: (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model, pp. 249\u2013268 (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_14","DOI":"10.1007\/978-3-030-25510-7_14"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00520-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00520-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00520-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:10:18Z","timestamp":1736417418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00520-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,25]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["520"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00520-6","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,25]]},"assertion":[{"value":"3 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors state that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}