Nov. 30, 2023, 1:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

This post continues a long, wonky discussion of Schnorr signature schemes and the Dilithium post-quantum signature. You may want to start with Part 1.


In the previous post I discussed the intuition behind Schnorr signatures, beginning with a high-level design rationale and ending with a concrete instantiation.


As a reminder: our discussion began with this Tweet by Chris Peikert:





Which we eventually developed into an abstract version of the Schnorr protocol that uses Chris’s “magic boxes” to realize part …

beyond concrete design high intuition may post-quantum quantum reminder signature signatures start

XDR Detection Engineer

@ SentinelOne | Italy

Security Engineer L2

@ NTT DATA | A Coruña, Spain

Cyber Security Assurance Manager

@ Babcock | Portsmouth, GB, PO6 3EN

Senior Threat Intelligence Researcher

@ CloudSEK | Bengaluru, Karnataka, India

Cybersecurity Analyst 1

@ Spry Methods | Washington, DC (Hybrid)

Security Infrastructure DevOps Engineering Manager

@ Apple | Austin, Texas, United States