Faster Hash-Based Signatures with Bounded Leakage

Conference paper

DOI: 10.1007/978-3-662-43414-7_12

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8282)
Cite this paper as:
Eisenbarth T., von Maurich I., Ye X. (2014) Faster Hash-Based Signatures with Bounded Leakage. In: Lange T., Lauter K., Lisoněk P. (eds) Selected Areas in Cryptography -- SAC 2013. SAC 2013. Lecture Notes in Computer Science, vol 8282. Springer, Berlin, Heidelberg


Digital signatures have become a key component of many embedded system solutions and are facing strong security and efficiency requirements. At the same time side-channel resistance is essential for a signature scheme to be accepted in real-world applications. Based on the Merkle signature scheme and Winternitz one-time signatures we propose a signature scheme with bounded side-channel leakage that is secure in a post-quantum setting. Novel algorithmic improvements for the authentication path computation bound side-channel leakage and improve the average signature computation time by close to 50 % when compared to state-of-the-art algorithms. The proposed scheme is implemented on an Intel Core i7 CPU and an AVR ATxmega microcontroller with carefully optimized versions for the respective target platform. The theoretical algorithmic improvements are verified in the implementations and cryptographic hardware accelerators are used to achieve competitive performance.


Hash-based cryptography Signatures Side-channel leakage Software Microcontroller Post-quantum cryptography 

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Worcester Polytechnic InstituteWorcesterUSA
  2. 2.Horst Görtz Institute for IT-SecurityRuhr-University BochumBochumGermany

Personalised recommendations