The implementation that matches the draft FIPS 205 is in the consistent-basew branch.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
pqc-forum+...@list.nist.gov.
To view this discussion on the web visit
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/4b585061-445c-4833-9ab2-b27ca12b6af7n%40list.nist.gov.
We assume that the randomness used to generate the private key is from a cryptographically secure random bit generator, for example, one of the 800-90A generators (of an appropriate security strength). With such a generator, it doesn’t matter if we expose some of the output; it is computationally infeasible to recover the remaining unexposed part.
|
You don't often get email from suzum...@gmail.com.
Learn why this is important
|
Am Mittwoch, 11. Februar 2026, 17:10:30 Mitteleuropäische Normalzeit schrieb
'Scott Fluhrer (sfluhrer)' via pqc-forum:
Hi,
> The main branch of my "parallel Sphincs" implementation
> https://github.com/sphincs/parallel-sphincsplus implements FIPS 205 fully
> (and while it hasn't undergone full ACVP testing, its self tests compares
> the generated public/private keys and signatures to public/private keys and
> signatures extracted from NIST's published test vectors).
>
> Of course, I can't claim this as a "reference" implementation, as it is a
> specifically ISA and AVX2 based implementation (and so is not quite as
> generally applicable as a true reference implementation would be).
An implementation that went through ACVP testing and has ACVP certificates is
available at [1] with C, AVX2 and ARMv8 implementations.
[1] https://leancrypto.org
Ciao
Stephan