ISARA Radiate™ Quantum-safe Library Version 3.1

Quantum-safe cryptographic primitives and algorithms.

XMSS Tree Strategies

Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform. More...

Variables

const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY
 Strategy for memory-constrained systems. More...
 
const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_FULL_TREE_STRATEGY
 Strategy for systems with unlimited memory. More...
 
const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_VERIFY_ONLY_STRATEGY
 Strategy for systems that only need to verify signatures. More...
 

Variable Documentation

◆ IQR_XMSS_FULL_TREE_STRATEGY

const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_FULL_TREE_STRATEGY

Strategy for systems with unlimited memory.

◆ IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY

const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_MEMORY_CONSTRAINED_STRATEGY

Strategy for memory-constrained systems.

◆ IQR_XMSS_VERIFY_ONLY_STRATEGY

const IQR_EXTERN iqr_XMSSTreeStrategy IQR_XMSS_VERIFY_ONLY_STRATEGY

Strategy for systems that only need to verify signatures.

Detailed Description

Tree strategies offer a trade-off between CPU utilization and memory usage during signing. Choosing the correct strategy is highly dependent on the hardware restrictions of the target platform.

Please see the Developer's Guide (online) for tree strategy details.