Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 27, Number 1, March 2022
Page(s) 1 - 10
DOI https://doi.org/10.1051/wujns/2022271001
Published online 16 March 2022
  1. Butin D. Hash-based signatures: State of play [J]. IEEE Security and Privacy, 2017, 15(4): 37-43. [Google Scholar]
  2. Suhail S, Hussain R, Khan A, et al. On the role of Hash- based signatures in quantum-safe internet of things: Current solutions and future directions [J]. IEEE Internet of Things Journal, 2020, 8(1): 1-17. [Google Scholar]
  3. Palmieri P. Hash-based signatures for the Internet of Things: Position paper [C]//Proceedings of the 15th ACM International Conference on Computing Frontiers. New York: ACM, 2018: 332-335. [Google Scholar]
  4. Saldamli G, Ertaul L, Kodirangaiah B. Post-quantum cryp- tography on IoT: Merkle’s tree authentication [C]// Proceedings of the International Conference on Wireless Networks (ICWN). Berlin: Springer-Verlag, 2018: 35-41. [Google Scholar]
  5. Pereira G C C F, Puodzius C, Barreto P S L M. Shorter Hash-based signatures [J]. Journal of Systems and Software, 2016, 116: 95-100. [Google Scholar]
  6. Ghosh S, Misoczki R, Sastry M R. Lightweight post-quantum-secure digital signature approach for IoT motes [EB/OL]. [2021-11-10]. https://eprint.iacr.org/2019/122.pdf. [Google Scholar]
  7. Song Y, Hu X, Wang W, et al. High-speed and scalable FPGA implementation of the key generation for the leighton-Micali signature protocol [C]//2021 IEEE International Symposium on Circuits and Systems (ISCAS). Washington D C: IEEE, 2021: 1-5. [Google Scholar]
  8. Alzubi J A. Blockchain-based Lamport Merkle digital signature: Authentication tool in IoT healthcare [J]. Computer Communications, 2021, 170: 200-208. [Google Scholar]
  9. Cho J Y , Szyrkowiec T. Practical authentication and access control for software-defined networking over optical networks [C]// Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges. New York: ACM, 2018: 8-13. [Google Scholar]
  10. 3GPP . 3GPP TS 33.501 Version 15.4.0 Release 15 Security Architecture and Procedures for 5G System[S/OL]. [2019-12-20]. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.04.00_60/ts_133501v150400p.pdf. [Google Scholar]
  11. Wang J Y, Lv S L, Xu J M. Analysis of secondary authentication methods for vertical industries that can be applied to 5G Networks [J]. Communications Technology, 2020, 10: 2538-2542. [Google Scholar]
  12. 3GPP . 3GPP TS 33.535 Version 16.0.0 Release 16 Authentication and Key Management for Applica-tions(AKMA) Based on 3GPP Credentials in the 5G System (5GS) [S/OL]. [2020-02-25]. https://www.etsi.org/deliver/etsi_ts/133500_133599/133535/16.00.00_60/ts_133535v160000p.pdf. [Google Scholar]
  13. Bernstein D J. Cost analysis of Hash collisions: Will quantum computers make sharcs obsolete [J]. SHARCS09, 2009, 9: 105-109. [Google Scholar]
  14. Bellini E, Caullery F, Hasikos A, et al. You shall not pass! (once again) an IoT application of post-quantum stateful signature schemes [C]// Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop. New York: ACM , 2018: 19-24. [Google Scholar]
  15. Singh N, Chhabra G, Singh K P, et al. A secure authentication scheme in multi-operator domain (SAMD) for wireless mesh network [C]//Proceedings of the International Conference on Data Engineering and Communication Technology. Berlin: Springer-Verlag, 2017: 343-357. [Google Scholar]
  16. Buchmann J, Dahmen E, Hulsing A. XMSS——A practical forward secure signature scheme based on minimal security assumptions [C]//International Workshop on Post- Quantum Cryptography. Berlin: Springer-Verlag, 2011: 117- 129. [Google Scholar]
  17. Campos F, Kohlstadt T, Reith S, et al. LMS vs XMSS: Comparison of stateful Hash-based signature schemes on arm cortex-m4 [C]//International Conference on Cryptology in Africa. Berlin: Springer-Verlag, 2020: 258-277. [Google Scholar]
  18. Lizama-Pérez L A, Montiel-Arrieta L J, Hernández-Mendoza F S, et al. Public Hash signature for mobile network devices [J]. Ingenieria Investigaciony Tecndogia, 2019(2): 1-10. DOI: 10.2220//FI.25940732E.2019.20n2018. [Google Scholar]
  19. de Oliveira A K D S, Lopez J, Cabral R, et al. High performance of Hash-based signature schemes [J]. International Journal of Advanced Computer Science and Applications, 2017, 8(3): 421-432. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.