Two of the alternative winner finalists are sphincs+ and picnic. These methods have a core advantage of using symmetric key approaches to digital signing, and where symmetric key methods are robust … When dersializing, to compute the * number of bytes expected, we must check how many challenge values are 1 * or 2.

One of the second … This document covers the public api functions that form the primary interface to the picnic signature scheme implementation. These functions provide key generation, digital signing, signature … Reference implementation of the picnic post-quantum signature scheme - picnic/picnic. h at master microsoft/picnic