In posts of September 25 and 28 we described several optimizations to SPHINCS, a signature algorithm that only relies on hash functions’ security, as opposed to RSA
Tag: cryptography
The making of Serious Cryptography
Many want to write a book, but what most people don’t realize is the actual extent to which it takes to write said book. Grueling
How to defeat Ed25519 and EdDSA using faults
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.