MESSAGE INDEX AWARE MULTI-HASH ACELERATOR FOR POST QUANTUM CRYPTOGRAPHY SECURE HASH-BASED SIGNING AND VERIFICATION
First Claim
1. An apparatus, comprising:
- a computer readable memory;
at least one of;
a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, ora verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; and
an accelerator logic to apply a structured order to at least one set of inputs to the hash-based signature scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example an apparatus comprises a computer readable memory, a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or a verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key, and an accelerator logic to apply a structured order to at least one set of inputs to the hash-based signature scheme. Other examples may be described.
4 Citations
21 Claims
-
1. An apparatus, comprising:
-
a computer readable memory; at least one of; a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or a verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; and an accelerator logic to apply a structured order to at least one set of inputs to the hash-based signature scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
performing at least one of; generating a signature to be transmitted in association with a message by applying a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or verifying a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; and applying a structured order to at least one set of inputs to the hash-based signature scheme. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, configure the processor to perform operations, comprising:
-
applying a hash-based signature scheme to perform at least one of; generating a signature using a private key, the signature to be transmitted in association with a message comprising a public key, or verifying the signature received in association with the message using the public key; and applying a structured order to at least one set of inputs to the hash-based signature scheme. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification