Literature

CROSS design

  • M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh, V. Weger, "Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem". In: Tang, Q., Teague, V. (eds) Public-Key Cryptography – PKC 2024. Lecture Notes in Computer Science, vol 14602. Springer, Cham. Link to: publication, eprint.
  • S. Bitzer, A. Pavoni, V. Weger, P. Santini, M. Baldi and A. Wachter-Zeh, "Generic Decoding of Restricted Errors," Proc. 2023 IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, 2023, pp. 246-251. Link to: publication, eprint.

CROSS analysis

  • W. Beullens, P. Briaud, M. Øygarden, "A Security Analysis of Restricted Syndrome Decoding Problems," IACR Communications in Cryptology, Vol. 1, No. 3, 2024. Link to: publication, eprint.
  • T. Aulbach, S. Düzlü, M. Meyer, P. Struck, M. Weishäupl, "Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures". In: MJ. Saarinen, D. Smith-Tone (eds) Post-Quantum Cryptography. PQCrypto 2024. Lecture Notes in Computer Science, vol 14772. Springer, Cham. Link to: publication, eprint.
  • M. Battagliola, R. Longo, F. Pintore, E. Signorini, G. Tognolini, "A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures," Mediterr. J. Math. 22, 132 (2025). Link to: publication, eprint.
  • P. Mondal, S. Adhikary, S. Kundu, A. Karmakar, "ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes". In: KM. Chung, Y. Sasaki (eds) Advances in Cryptology – ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. Link to: publication, eprint.
  • M. Czuprynko, A. Mukherjee, S.S. Roy, "Correlation Power Analysis of LESS and CROSS". In: A. Nitaj, S. Petkova-Nikova, V. Rijmen (eds) Progress in Cryptology - AFRICACRYPT 2025. Lecture Notes in Computer Science, vol 15651. Springer, Cham. Link to: publication, eprint.
  • J. Schupp, G. Sigl, "A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)". In: M. Rivain, P. Sasdrich (eds) Constructive Approaches for Security Analysis and Design of Embedded Systems. CASCADE 2025. Lecture Notes in Computer Science, vol 15952. Springer, Cham. Link to: publication, eprint.

CROSS implementation

  • H. Hart, P. Mondal, S. Kundu, S. Adhikary, A. Karmakar, C. Li, "LightCROSS: A Secure and Memory Optimized Post-Quantum Digital Signature CROSS," Cryptology ePrint Archive, Paper 2024/1929. Link to eprint.
  • P. Karl, F. Antognazza, A. Barenghi, G. Pelosi, G. Sigl, "High-Performance FPGA Accelerator for the Post-quantum Signature Scheme CROSS," Cryptology ePrint Archive, Paper 2025/1161. Link to eprint.
  • J. Schupp, M. Gianvecchio, A. Barenghi, P. Karl, G. Pelosi, G. Sigl, "Optimizing the Post Quantum Signature Scheme CROSS for Resource Constrained Devices," Cryptology ePrint Archive, Paper 2025/1928. Link to eprint.
  • A. Barenghi, M. Gianvecchio, G. Pelosi, "A high efficiency AVX2-optimized engineering of the post-quantum digital signature CROSS," Journal of Information Security and Applications, Vol. 97, 2026. Link to: publication.