ISARA Radiate™ Quantum-safe Library Version 3.1

Quantum-safe cryptographic primitives and algorithms.

HSS Tree Strategies

Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform. More...

Variables

const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_MEMORY_CONSTRAINED_STRATEGY
 Strategy for memory-constrained systems. More...
 
const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_FULL_TREE_STRATEGY
 Strategy for systems with unlimited memory. More...
 
const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_VERIFY_ONLY_STRATEGY
 Strategy for systems that only need to verify signatures. More...
 

Variable Documentation

◆ IQR_HSS_FULL_TREE_STRATEGY

const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_FULL_TREE_STRATEGY

Strategy for systems with unlimited memory.

◆ IQR_HSS_MEMORY_CONSTRAINED_STRATEGY

const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_MEMORY_CONSTRAINED_STRATEGY

Strategy for memory-constrained systems.

◆ IQR_HSS_VERIFY_ONLY_STRATEGY

const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_VERIFY_ONLY_STRATEGY

Strategy for systems that only need to verify signatures.

Detailed Description

Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform.

Please see the Developer's Guide (online) for tree strategy details.