Skip to main content
Hybrid Digital Signatures with Strong Unforgeability
Hybrid Digital Signatures with Strong Unforgeability
draft-prabel-cfrg-suf-hybrid-sigs-01
This document is an Internet-Draft (I-D).
Anyone may submit an I-D to the IETF.
This I-D is not endorsed by the IETF and has no formal standing in the
IETF standards process.
| Document | Type | Active Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Lucas Prabel , Guilin WANG , Jonas Janneck , Tirumaleswar Reddy.K , John Preuß Mattsson | ||
| Last updated | 2026-03-01 | ||
| RFC stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats | |||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | I-D Exists | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
draft-prabel-cfrg-suf-hybrid-sigs-01
CFRG L. Prabel
Internet-Draft G. Wang
Intended status: Standards Track Huawei
Expires: 2 September 2026 J. Janneck
Ruhr University Bochum
T. Reddy
Nokia
J. Preuß Mattsson
Ericsson AB
1 March 2026
Hybrid Digital Signatures with Strong Unforgeability
draft-prabel-cfrg-suf-hybrid-sigs-01
Abstract
This document proposes a generic hybrid signature construction that
achieves strong unforgeability under chosen-message attacks (SUF-
CMA), provided that the second component (typically the post-quantum
one) is SUF-CMA secure. The proposed hybrid construction differs
from the current composite hybrid approach by binding the second
(post-quantum) signature to the concatenation of the message and the
first (traditional) signature. This approach ensures that hybrid
signatures maintain SUF-CMA security even when the first component
only provides EUF-CMA security.
In addition to this general hybrid construction, this document also
proposes a non-black-box variant specifically tailored for schemes
built from the Fiat-Shamir paradigm. This variant is SUF-CMA secure
as long as only one component is SUF-CMA secure.
About This Document
This note is to be removed before publishing as an RFC.
Status information for this document may be found at
https://datatracker.ietf.org/doc/draft-prabel-cfrg-suf-hybrid-sigs/.
Discussion of this document takes place on the Cryptography Forum
Research Group mailing list (mailto:cfrg@ietf.org), which is archived
at https://mailarchive.ietf.org/arch/browse/cfrg/. Subscribe at
https://www.ietf.org/mailman/listinfo/cfrg/.
Source for this draft and an issue tracker can be found at
https://github.com/lucasprabel/draft-cfrg-suf-hybrid-sigs.
Prabel, et al. Expires 2 September 2026 [Page 1]
Internet-Draft SUF Hybrid Signature March 2026
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 2 September 2026.
Copyright Notice
Copyright (c) 2026 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 4
3. Proposed Construction . . . . . . . . . . . . . . . . . . . . 4
3.1. Hybrid Key Generation . . . . . . . . . . . . . . . . . . 5
3.2. Hybrid Sign . . . . . . . . . . . . . . . . . . . . . . . 5
3.3. Hybrid Verify . . . . . . . . . . . . . . . . . . . . . . 5
3.4. Related works . . . . . . . . . . . . . . . . . . . . . . 6
4. Non-black-box Construction . . . . . . . . . . . . . . . . . 6
4.1. Hybrid Key Generation . . . . . . . . . . . . . . . . . . 6
4.2. Hybrid Sign . . . . . . . . . . . . . . . . . . . . . . . 7
4.3. Hybrid Verify . . . . . . . . . . . . . . . . . . . . . . 7
4.4. Security and Applicability . . . . . . . . . . . . . . . 8
5. Why the Binding Hybrid is Required . . . . . . . . . . . . . 8
5.1. Loss of Non-Repudiation in Parallel Hybrids under CRQC . 9
5.2. ECDSA vs EdDSA in Hybrid Constructions . . . . . . . . . 9
Prabel, et al. Expires 2 September 2026 [Page 2]
Internet-Draft SUF Hybrid Signature March 2026
6. Security Considerations . . . . . . . . . . . . . . . . . . . 10
6.1. Security Model and Motivation . . . . . . . . . . . . . . 10
6.2. SUF-CMA Security . . . . . . . . . . . . . . . . . . . . 10
6.2.1. Why SUF-CMA matters . . . . . . . . . . . . . . . . . 10
6.2.2. Security Rationale . . . . . . . . . . . . . . . . . 10
6.3. Non-Separability . . . . . . . . . . . . . . . . . . . . 11
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
8.1. Normative References . . . . . . . . . . . . . . . . . . 11
8.2. Informative References . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12
1. Introduction
With the emergence of post-quantum (PQ) digital signatures, several
groups (including ETSI CYBER and IETF LAMPS, TLS JOSE, SSHM) have
explored hybrid constructions combining traditional and PQ
algorithms. The main goal is to ensure long-term security during the
transition to post-quantum cryptography, acknowledging that
traditional algorithms are more mature than post-quantum ones and
that the latter still raise uncertainty about their security.
Current composite hybrid schemes typically provide existential
unforgeability under chosen-message attacks (EUF-CMA), but do not
ensure strong unforgeability. SUF-CMA extends EUF-CMA by requiring
that it be computationally infeasible to produce a new valid
signature even for a message-signature pair previously observed.
This distinction has practical implications in preventing message
replay, transaction duplication, and log poisoning.
Although several recent algorithms such as EdDSA, ML-DSA, and SLH-DSA
claim to achieve SUF-CMA security, some popular traditional schemes
(RSA, ECDSA) only achieve EUF-CMA. Therefore, constructing a hybrid
digital signature scheme maintaining SUF-CMA when one component does
not is of particular interest.
To address this concern, this document specifies a generic hybrid
construction that guarantees SUF-CMA security when the second
underlying component (e.g. the PQ scheme) is SUF-CMA. The
construction is quite simple and can be applied generically across
PQ/T signature combinations. It is originally proposed in [BH23],
though its SUF-CMA security is not analyzed in the article.The
construction could also be used for a hybrid PQ/PQ security, relying
on two post-quantum components.
Prabel, et al. Expires 2 September 2026 [Page 3]
Internet-Draft SUF Hybrid Signature March 2026
2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
This document follows the terminology for post-quantum hybrid schemes
defined in [I-D.draft-ietf-pquip-pqt-hybrid-terminology].
This section recalls some of this terminology, but also adds other
definitions used throughout the whole document:
_EUF-CMA_: Existential Unforgeability under Chosen Message Attack.
_SUF-CMA_: Strong Unforgeability under Chosen Message Attack.
_Post-Quantum Asymmetric Cryptographic Algorithm_: An asymmetric
cryptographic algorithm that is intended to be secure against attacks
using quantum computers as well as classical computers. They can
also be called quantum-resistant or quantum-safe algorithms.
_PQ/T Hybrid Digital Signature_: A multi-algorithm digital signature
scheme made up of two or more component digital signature algorithms
where at least one is a post-quantum algorithm and at least one is a
traditional algorithm.
_Post-Quantum Traditional (PQ/T) Hybrid Composite Scheme_: A multi-
algorithm scheme where at least one component algorithm is a post-
quantum algorithm and at least one is a traditional algorithm and the
resulting composite scheme is exposed as a singular interface of the
same type as the component algorithms.
_Component Scheme:_ Each cryptographic scheme that makes up a PQ/T
hybrid scheme or PQ/T hybrid protocol.
3. Proposed Construction
The proposed construction ensures that the second (nested) signature
binds the first (nested) signature, making the overall scheme SUF-CMA
as long as the (typically PQ) component is SUF-CMA secure. The
hybrid signature construction is defined in the following
subsections.
Prabel, et al. Expires 2 September 2026 [Page 4]
Internet-Draft SUF Hybrid Signature March 2026
Before signing a message m, the hybrid scheme derives a message
representative m' from m to address specific security concerns, and
in particular to achieve non-separability, following a similar
approach to [I-D.draft-ietf-lamps-pq-composite-sigs].
3.1. Hybrid Key Generation
Generate component keys
- Generate `(pk1, sk1)` for the traditional scheme.
- Generate `(pk2, sk2)` for the post-quantum scheme.
- The hybrid public key is `pk = (pk1 || pk2)`.
3.2. Hybrid Sign
The Hybrid.Sign algorithm consists in signing a message m' derived
from m with the first component, and then signing the concatenation
m' || s1 of the derived message with the first signature with the
second component.
Generate the message representative
- Compute m' = Prefix || Label || len(ctx) || ctx || PH(m)
Generate hybrid signature
- Compute s1 = Sign_1(sk1, m')
- Compute s2 = Sign_2(sk2, m' || s1)
- Output the hybrid signature s = (s1 || s2)
In the computation of the message representative: - Prefix is the
byte encoding of the string "SUFHybridSignature2025", which in
hexadecimal is "5355464879627269645369676E617475726532303235". -
Label: a label which is specific to the particular component
algorithms being used. - len(ctx): a single byte representing the
length of ctx. - ctx: the context bytes. - PH(m): the hash of the
message to be signed.
3.3. Hybrid Verify
Verify hybrid signature
- Compute m' = Prefix || Label || len(ctx) || ctx || PH(m)
- Parse s as (s1, s2)
- Compute Verify_1(pk1, m', s1)
- Compute Verify_2(pk2, m' || s1, s2)
- Accept if both verifications succeed.
Prabel, et al. Expires 2 September 2026 [Page 5]
Internet-Draft SUF Hybrid Signature March 2026
3.4. Related works
The hybrid construction in [I-D.draft-ietf-lamps-pq-composite-sigs]
only provides SUF-CMA security if both components is providing SUF-
CMA security and one of the components are deterministic. As
traditional signatures do not provide any security against quantum
attackers, when [I-D.draft-ietf-lamps-pq-composite-sigs] is used for
PQ/T hybrid scheme, it does not provide SUF-CMA security against
quantum attackers. In this document, only the second component needs
to be SUF-CMA so that the hybrid scheme achieves SUF-CMA security.
In contrast to [I-D.draft-ietf-lamps-pq-composite-sigs], the signing
process of the hybrid construction proposed in this document cannot
be parallelized. Indeed, computing the hybrid signature s = (s1 ||
s2) requires to compute s1 = Sign_1(sk1, m') first in order to
compute s2 = Sign_2(sk2, m' || s1).
4. Non-black-box Construction
The proposed construction of this section ensures that the overall
scheme is SUF-CMA as long as only one component is SUF-CMA secure.
The hybrid signature construction is defined in the following
subsections.
The hybrid can be used for signature schemes that are built from the
Fiat-Shamir paradigm as the first component and from any signature
scheme as the second compoenent. Hence, they use a canonical
identification scheme (ID) underlying a Fiat-Shamir construction and
a signature scheme (Sig_2). This applies to combining EdDSA and any
post-quantum signature scheme, for example ML-DSA.
Before signing a message m, the hybrid scheme derives a message
representative m' from m to address specific security concerns, and
in particular to achieve non-separability, following a similar
approach to [I-D.draft-ietf-lamps-pq-composite-sigs].
4.1. Hybrid Key Generation
Generate component keys
- Generate `(pk1, sk1)` for the (traditional) ID scheme.
- Generate `(pk2, sk2)` for the (post-quantum) signature scheme.
- The hybrid public key is `pk = (pk1, pk2)`.
Prabel, et al. Expires 2 September 2026 [Page 6]
Internet-Draft SUF Hybrid Signature March 2026
4.2. Hybrid Sign
The Hybrid.Sign algorithm consists of applying the Fiat-Shamir
paradigm for the first signature component. During the process
(after the commitment has been computed), the second component is
applied by signing the message and the commitment. The remainder of
the Fiat-Shamir signature is computed using the second signature
component instead of the message and the commitment as usual.
Generate the message representative
- Compute m' = Prefix || Label || len(ctx) || ctx || pk's || PH(m)
Generate hybrid signature
- Compute (com, st) = ID.Com(sk1)
- Compute m'' = PH(1 || m' || com)
- Compute s2 = Sig.Sign_2(sk2, m'')
- Compute chl = PH(2 || s2)
- Compute rsp = ID.Rsp(sk1, com, chl, st)
- Output the hybrid signature s = (rsp || s2)
In the computation of the message representative: - Prefix is the
byte encoding of the string "SUFHybridSignature2025", which in
hexadecimal is "5355464879627269645369676E617475726532303235". -
Label: a specific label which is specific to the particular component
algorithms being used. - len(ctx): a single byte representing the
length of ctx. - ctx: the context bytes. - pk's: the concatenation of
pk1 and pk2. - PH(m): the hash of the message to be signed.
4.3. Hybrid Verify
Verify hybrid signature
- Compute m' = Prefix || Label || len(ctx) || ctx || pk's || PH(m)
- Parse s as (rsp || s2)
- Compute chl = PH(2 || s2)
- Compute com = ID.ExtCom(pk1, ch, rsp)
- Compute m'' = PH(1 || m' || com)
- Compute Verify_2(pk2, m'', s2)
- Accept if verification succeeds.
Prabel, et al. Expires 2 September 2026 [Page 7]
Internet-Draft SUF Hybrid Signature March 2026
4.4. Security and Applicability
The hybrid is SUF-CMA if one of the underlying signatures is SUF-CMA
secure. Additionally, the ID scheme must have unique responses and
the second signature component (post-quantum component) must fulfill
message-bound security (MBS) [BUFF] and random-message validity (RMV)
[Jan25].
The first requirement (on the traditional scheme) is fulfilled by
EdDSA which is built from an ID scheme with unique responses. The
second requirement (on the post-quantum scheme) is fulfilled by any
of NIST standards/winners, i.e. ML-DSA, SLH-DSA, Falcon (to be FN-
DSA).
5. Why the Binding Hybrid is Required
Hybrid constructions are often intended to support requirements
described in non-cryptographic terms as "single-signature semantics"
or "artifact-level integrity." These terms generally refer to the
operational goal where a message should be associated with one, and
only one, valid signature string. In many real-world deployments,
this security property is central: software releases, firmware
images, signed logs, legal/financial documents, etc. In
cryptography, this goal is most closely addressed by SUF-CMA
security. While SUF-CMA does not mathematically guarantee uniqueness
(the existence of only one valid signature per message), it provides
a computational guarantee that an adversary cannot produce a
different valid signature for a message that has already been signed.
A binding hybrid is required because parallel hybrids fail to
maintain SUF-CMA if one component (e.g., the traditional one) is only
EUF-CMA or becomes forgeable. In such cases, the hybrid signature
becomes malleable, allowing multiple valid signature strings for the
same message, which breaks the intended "single-signature" logic of
the application. A hybrid design achieves SUF-CMA only if one
signature component is cryptographically bound to the other, forming
a binding hybrid rather than signing the same message independently.
Any successful forgery of a binding hybrid must fall into one of two
categories:
* New second signature on a new input:
The attacker generates a new traditional signature s1* that the
legitimate signer never produced. The attacker would then need to
forge a valid s2* over the concatenation m' || s1*. Producing
such an s2* is a forgery against the PQC algorithm.
Prabel, et al. Expires 2 September 2026 [Page 8]
Internet-Draft SUF Hybrid Signature March 2026
* Different second-signature on an already-signed input:
The attacker reuses an existing (m', s1) but fabricates a distinct
s2* for the same (m' || s1), yielding two valid second signatures
for one message.
Both outcomes constitute a SUF-CMA forgery against the second
component: the first case for a new message, the second for a second
valid signature on an existing message. If the second component is
SUF-CMA secure, neither case is computationally feasible, and the
combined hybrid inherits SUF-CMA security.
5.1. Loss of Non-Repudiation in Parallel Hybrids under CRQC
As described in [I-D.draft-ietf-lamps-pq-composite-sigs], composite
hybrids produce multiple component signatures independently over the
same message.
Once a CRQC can forge the traditional component, an attacker can
create an alternate classical signature s1* for a message that
already has a valid hybrid signature (s1, s2). Because the PQC
signature s2 remains valid independently of the classical signature,
the modified pair (s1*, s2) also verifies successfully.
While authenticity of the PQC component remains intact, the hybrid
scheme is no longer SUF-CMA secure: multiple distinct hybrid
signatures (s1, s2) and (s1*, s2) are both valid signatures for the
same message. Therefore, once the classical algorithm becomes
breakable, parallel hybrids no longer provide SUF-CMA security.
On the contrary, this document’s hybrid construction, by binding the
second signature s2 to the first signature s1, ensures single-
signature semantics and preserves non-repudiation.
5.2. ECDSA vs EdDSA in Hybrid Constructions
It is important to distinguish the properties of ECDSA and EdDSA.
Indeed, even though both ECDSA (secp256r1/secp384r1) and EdDSA
(Ed25519/Ed448) become mathematically breakable once a CRQC can
derive private keys from public keys, their behaviour differs:
* ECDSA is randomized and only provides EUF-CMA security.
* EdDSA is designed to be SUF-CMA and its signing process is
deterministic. In binding hybrids, EdDSA’s fixed, deterministic
format enables unambiguous inclusion of s1 in the PQC input (m' ||
s1), simplifying verification and ensuring consistent
interpretation across implementations.
Prabel, et al. Expires 2 September 2026 [Page 9]
Internet-Draft SUF Hybrid Signature March 2026
Consequently, both algorithms lose their security properties,
including SUF-CMA, once a CRQC can derive private keys. Therefore,
neither algorithm can guarantee non-repudiation in a parallel hybrid
construction under a quantum threat. The binding construction is
therefore necessary regardless of the traditional algorithm used, as
it ensures the overall SUF-CMA property is maintained by the post-
quantum component.
6. Security Considerations
6.1. Security Model and Motivation
The hybrid construction described in this document aims to guarantee
strong unforgeability of the composite signature whenever the second
component is SUF-CMA secure. This is in contrast to the composite
construction in [I-D.draft-ietf-lamps-pq-composite-sigs], where SUF-
CMA of the composite generally requires both components to be SUF-
CMA. The design proposed here strengthens that property: SUF-CMA of
the overall construction depends only on the SUF-CMA of the second
component, regardless of the security level of the first one.
6.2. SUF-CMA Security
6.2.1. Why SUF-CMA matters
While EUF-CMA security could be sufficient in several use cases,
weaknesses in EUF-only schemes allow "re-signing" the same message,
enabling real-world exploits such as replay of messages, double
receipts, and log poisoning. Moreover, many current deployed systems
implicitly assume that all digital signatures are SUF-CMA secure.
For this reason, the construction ensures that if the second
component is SUF-CMA, the hybrid automatically resists replay and
duplication attacks, aligning with best practices in recent signature
standards (EdDSA, ML-DSA, SLH-DSA, etc.).
6.2.2. Security Rationale
Intuitively, an adversary attempting to forge (m*, s1*, s2*) must
either:
* Forge s2* on (m* || s1*), which is infeasible if the second scheme
is SUF-CMA;
or
* Reuse an existing (m, s1) pair with a modified s2, which again
breaks SUF-CMA of the second scheme.
Prabel, et al. Expires 2 September 2026 [Page 10]
Internet-Draft SUF Hybrid Signature March 2026
Consequently, if the second component is SUF-CMA secure, the hybrid
construction remains SUF-CMA secure even when the first component
provides only EUF-CMA security.
In contrast, if the second scheme were only EUF-CMA, the second
attack (re-signing the same message differently) would no longer be
excluded, and the hybrid construction would not be SUF-CMA secure.
This contrasts with classical composite hybrids (e.g. trad(M) ||
PQ(M)) where the PQ signature does not authenticate the output of the
traditional signature, leaving possible avenues for replay or
signature substitution.
6.3. Non-Separability
The document [I-D.draft-ietf-pquip-hybrid-signature-spectrums]
defines both notions of Weak Non-Separability (WNS) and Strong Non-
Separability (SNS).
The hybrid construction in this document achieves WNS because the
Prefix of the message representative m' is an evidence that a
verifier may be able to identify, preventing the validation of a
component signature which would have been removed from the composite
signature.
However, SNS is not achieved, as s1 stripped from a composite
signature s = (s1 || s2) is a valid component signature of the
message m' and s2 is a valid component signature of the message m' ||
s1.
7. IANA Considerations
This document has no IANA actions.
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.
8.2. Informative References
Prabel, et al. Expires 2 September 2026 [Page 11]
Internet-Draft SUF Hybrid Signature March 2026
[BH23] Bindel, N. and B. Hale, "A Note on Hybrid Signature
Schemes", July 2023,
<https://eprint.iacr.org/2023/423.pdf>.
[BUFF] Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., and C.
Janson, "BUFFing signature schemes beyond unforgeability
and the case of post-quantum signatures", 2021,
<https://ieeexplore.ieee.org/document/9519420>.
[I-D.draft-ietf-lamps-pq-composite-sigs]
Ounsworth, M., Gray, J., Pala, M., Klaußner, J., and S.
Fluhrer, "Composite ML-DSA for use in X.509 Public Key
Infrastructure", Work in Progress, Internet-Draft, draft-
ietf-lamps-pq-composite-sigs-15, 24 February 2026,
<https://datatracker.ietf.org/doc/html/draft-ietf-lamps-
pq-composite-sigs-15>.
[I-D.draft-ietf-pquip-hybrid-signature-spectrums]
Bindel, N., Hale, B., Connolly, D., and F. D, "Hybrid
signature spectrums", Work in Progress, Internet-Draft,
draft-ietf-pquip-hybrid-signature-spectrums-07, 20 June
2025, <https://datatracker.ietf.org/doc/html/draft-ietf-
pquip-hybrid-signature-spectrums-07>.
[I-D.draft-ietf-pquip-pqt-hybrid-terminology]
D, F., P, M., and B. Hale, "Terminology for Post-Quantum
Traditional Hybrid Schemes", Work in Progress, Internet-
Draft, draft-ietf-pquip-pqt-hybrid-terminology-06, 10
January 2025, <https://datatracker.ietf.org/doc/html/
draft-ietf-pquip-pqt-hybrid-terminology-06>.
[Jan25] Janneck, J., "Bird of Prey: Practical Signature Combiners
Preserving Strong Unforgeability", October 2025,
<https://eprint.iacr.org/2025/1844.pdf>.
Authors' Addresses
Lucas Prabel
Huawei
Email: lucas.prabel@huawei.com
Guilin Wang
Huawei
Email: wang.guilin@huawei.com
Prabel, et al. Expires 2 September 2026 [Page 12]
Internet-Draft SUF Hybrid Signature March 2026
Jonas Janneck
Ruhr University Bochum
Email: jonas.janneck@rub.de
Tirumaleswar Reddy
Nokia
Bangalore
Karnataka
India
Email: kondtir@gmail.com
John Preuß Mattsson
Ericsson AB
Email: john.mattsson@ericsson.com
Prabel, et al. Expires 2 September 2026 [Page 13]