Commit 6d6d0241 authored by Lena Heimberger's avatar Lena Heimberger
Browse files

Update README.md

parent b24d0bee
......@@ -11,8 +11,8 @@ Averaged over 100 iterations with random message input, the following signature
|SPHINCS+ flavor | time for signature generation in milliseconds | time for signature verification in microseconds|
|---------------------|-----------|---------|
|SPHINCS+ flavor | time for signature generation<br> in milliseconds | time for signature verification in microseconds| signature size in kB|
|---------------------|-----------|---------|--------|
|haraka-128f-simple | 62.08 | 136.754 |
|haraka-128f-robust | 98.42 | 66.958 |
|haraka-128s-simple | 886.33 | 106.388 |
......@@ -48,8 +48,11 @@ Averaged over 100 iterations with random message input, the following signature
|shake256-256f-simple | 357.6 | 2.542 |
|shake256-256f-robust | 669.73 | 3.173 |
|shake256-256s-simple | 3013.07 | 4.643 |
shake256-256s-robust | 5632.6 | 4.550 |
|shake256-256s-robust | 5632.6 | 4.550 |
### Use case
Since SPHINCS+ only signs a hash of the document and is therefore is very fast, it's useful for rapidly signing large files. For reference, we [digitally signed the SPHINCS+ specification](https://extgit.iaik.tugraz.at/krypto/javasphincsplus/-/blob/master/examples/sphincs+-specification_signed.pdf).
In case the interested user would like to verify the signed specification, the authors unfortunately do not have knowledge of a PDF viewer being able to decode SPHINCS+ signatures or accepting our homebrewed certificate.
## Used Libraries
Haraka is implemented without any dependencies. Please be aware that, if you are using a CPU without AES-NI hardware instructions, Haraka is susceptible to side-channel attacks.
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment