
ISARA Radiate™ Quantum-safe Library Version 3.1
Quantum-safe cryptographic primitives and algorithms.
HSS Tree Strategies
Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform. More...
Variables | |
const IQR_EXTERN iqr_HSSTreeStrategy | IQR_HSS_MEMORY_CONSTRAINED_STRATEGY |
Strategy for memory-constrained systems. More... | |
const IQR_EXTERN iqr_HSSTreeStrategy | IQR_HSS_FULL_TREE_STRATEGY |
Strategy for systems with unlimited memory. More... | |
const IQR_EXTERN iqr_HSSTreeStrategy | IQR_HSS_VERIFY_ONLY_STRATEGY |
Strategy for systems that only need to verify signatures. More... | |
Variable Documentation
◆ IQR_HSS_FULL_TREE_STRATEGY
const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_FULL_TREE_STRATEGY |
Strategy for systems with unlimited memory.
◆ IQR_HSS_MEMORY_CONSTRAINED_STRATEGY
const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_MEMORY_CONSTRAINED_STRATEGY |
Strategy for memory-constrained systems.
◆ IQR_HSS_VERIFY_ONLY_STRATEGY
const IQR_EXTERN iqr_HSSTreeStrategy IQR_HSS_VERIFY_ONLY_STRATEGY |
Strategy for systems that only need to verify signatures.
Detailed Description
Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform.
Please see the Developer's Guide (online) for tree strategy details.