
ISARA Radiate™ Quantum-safe Library Version 3.1
Quantum-safe cryptographic primitives and algorithms.
XMSS Tree Strategies
Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform. More...
Variables | |
const IQR_EXTERN iqr_XMSSTreeStrategy | IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY |
Strategy for memory-constrained systems. More... | |
const IQR_EXTERN iqr_XMSSTreeStrategy | IQR_XMSS_FULL_TREE_STRATEGY |
Strategy for systems with unlimited memory. More... | |
const IQR_EXTERN iqr_XMSSTreeStrategy | IQR_XMSS_VERIFY_ONLY_STRATEGY |
Strategy for systems that only need to verify signatures. More... | |
Variable Documentation
◆ IQR_XMSS_FULL_TREE_STRATEGY
const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_FULL_TREE_STRATEGY |
Strategy for systems with unlimited memory.
◆ IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY
const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY |
Strategy for memory-constrained systems.
◆ IQR_XMSS_VERIFY_ONLY_STRATEGY
const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_VERIFY_ONLY_STRATEGY |
Strategy for systems that only need to verify signatures.
Detailed Description
Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform.
Please see the Developer's Guide (online) for tree strategy details.