Open Access
| Issue |
ITM Web Conf.
Volume 78, 2025
International Conference on Computer Science and Electronic Information Technology (CSEIT 2025)
|
|
|---|---|---|
| Article Number | 01028 | |
| Number of page(s) | 10 | |
| Section | Deep Learning and Reinforcement Learning – Theories and Applications | |
| DOI | https://doi.org/10.1051/itmconf/20257801028 | |
| Published online | 08 September 2025 | |
- Shor, P.W.: 'Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer', SIAM Journal on Computing, 1997, 26, (5), pp. 1484–1509 [Google Scholar]
- National Institute of Standards and Technology (NIST): 'Post-quantum cryptography standardization', 2016 [Google Scholar]
- Bernstein, D., Hülsing, A., Kölbl, S., et al.: 'The SPHINCS+ signature framework'. Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS '19), New York, USA, 2019, pp. 2123–2146 [Google Scholar]
- Bernstein, D., Hopwood, D., Hülsing, A., et al.: 'SPHINCS: Practical stateless hash-based signatures'. Proc. Advances in Cryptology - EUROCRYPT 2015, Berlin, Germany, 2015, pp. 368–397 [Google Scholar]
- Hülsing, A., Kudinov, M.: 'SPHINCS+ submissions to the NIST PQC standardization project', NIST Post-Quantum Cryptography Round 3 Submissions, 2021, https://sphincs.org/resources.html, accessed 15 April 2025 [Google Scholar]
- Buchmann, J., Dahmen, E., Hülsing, A.: 'XMSS - A practical forward secure signature scheme based on minimal security assumptions'. Proc. Post-Quantum Cryptography (PQCrypto 2011), Berlin, Germany, 2011, pp. 117–139 [Google Scholar]
- Moody, D., Alagic, G., Apon, D., et al.: 'Status report on the second round of the NIST post-quantum cryptography standardization process', National Institute of Standards and Technology, Gaithersburg, 2020, https://doi.org/10.6028/NIST.IR.8309, accessed 15 April 2025 [Google Scholar]
- Yehia, M., AlTawy, R., Gulliver, T.A.: 'Verifiable obtained random subsets for improving SPHINCS+'. Proc. Information Security and Privacy, Cham, Switzerland, 2021, pp. 13083 [Google Scholar]
- Kampanakis, P., Panburana, P., Curcio, M., et al.: 'Post-quantum hash-based signatures for secure boot'. Proc. Silicon Valley Cybersecurity Conference, Cham, Switzerland, 2021, pp. 1383 [Google Scholar]
- Danielsen, L.E., Melkonian, T.: 'A note on SPHINCS+ parameter sets'. Proc. 15th International Conference on Post-Quantum Cryptography, Berlin, Germany, 2021, pp. 342–356 [Google Scholar]
- Li, T., Song, L.: 'Privacy-preserving communication-efficient federated multi-armed bandits', IEEE Journal on Selected Areas in Communications, 2022, 40, (3), pp. 773–787 [Google Scholar]
- Shi, C., Shen, C., Yang, J.: 'Federated multi-armed bandits with personalization'. Proc. 24th International Conference on Artificial Intelligence and Statistics, 2021, pp. 2917–2925 [Google Scholar]
- JSROJAS: 'IP Network Traffic Flows Labeled with 87 Apps', Kaggle, 2018, https://www.kaggle.com/datasets/jsrojas/ip-network-traffic-flows-labeled-with-87-apps, accessed 20 March 2025 [Google Scholar]
- SEALLVER: 'SphincsplusSM3', GitHub, 2018, https://github.com/Seallver/SphincsplusSM3, accessed 20 March 2025 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

