EVALUATION AND COMPARISON OF CRYPTOGRAPHIC DIGITAL SIGNATURE TRANSFORMATIONS OF THE ADDITIONAL NIST COMPETITION «DIGITAL SIGNATURE SCHEMES»
Abstract
In the modern world, the development of quantum computing threatens classical cryptographic algorithms, in particular RSA, ECDSA and DSA, which are used to ensure digital security. This creates a need to develop post-quantum cryptographic solutions that can be resistance under quantum computers attacks. Stable digital signature algorithms are especially important, as they provide authentication, integrity and non-repudiation of information in financial, legal and government systems. The article analyzes and compares cryptographic digital signature schemes participating in the NIST supplementary competition “Digital Signature Schemes”. The main mathematical foundations of these algorithms are investigated, in particular, lattice cryptography, code-based schemes, multivariate transformations, elliptic curve isogenies and MPC-in-the-Head methods. Their performance, security and efficiency in the context of post-quantum threats are assessed. A detailed analysis of the length of public keys, signatures and the speed of key generation, signing and verification operations is carried out. The main advantages and disadvantages of each approach are identified, promising directions for the development of post-quantum digital signatures and their possible practical application are identified. The research is relevant in connection with the need to transition to new cryptographic standards that will guarantee data security in the future. The results allow to assess the strengths and weaknesses of the considered algorithms, as well as to identify promising directions for the further researches of post-quantum cryptography.
Downloads
References
Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process (2024). NIST Internal Report NIST IR 8528 https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8528.pdf
National Institute of Standards and Technology (2022) Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process. https://csrc.nist.gov/csrc/media/Projects/ pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf
National Institute of Standards and Technology (2025) Post-Quantum Cryptography: Additional Digital Signature Schemes Round 2 Additional Signatures. https://csrc.nist.gov/projects/pqc-dig-sig/round-2- additional-signatures
Information Technologies. Cryptographic Information Protection (2023) Electronic Signature Algorithm on Algebraic Lattices with Deviations: DSTU 9212:2023. Kyiv: Derzhspozhyvstandart of Ukraine [in Ukrainian]
CROSS – Codes and Restricted Objects Signature Scheme (2025) Submission to the NIST Post-Quantum Cryptography Standardization Process. https://www.cross-crypto.com/CROSS_ Specification_v2.0.pdf
Baldi M. and others (2025) LESS. Linear Equivalence Signature Scheme. https://www.less-project.com/ LESS-2025-02-07.pdf
Marius A. and others (2025) SQIsign. Algorithm specifications and supporting documentation. Version 2.0. URL:. https://sqisign.org/spec/sqisign-20250205.pdf
Joppe W. Bos and others (2025) HAWK. Version 1.1. URL: https://hawk-sign.info/hawk-spec.pdf
Agj G. and others (2025) Mirath Signature Scheme Algorithm Specifications and Supporting Documentation. URL: https://pqc-mirath.org/assets/downloads/mirath_v2.0.pdf.
Feneuil Th. Rivain M (2023) MQOM: MQ on my Mind Algorithm. Specifications and Supporting Documentation (Version 1.0). URL: https://mqom.org/docs/mqom-v1.0.pdf
Aaraj Na. and others (2025) PERK. Version 2.0. URL: https://pqc-perk.org/assets/downloads/perk- v2.0.pdf
Aragon N. and others. RYDE Signature Scheme. Algorithm Specifications and Supporting Documentation. Version 2.0. URL: https://pqc-ryde.org/assets/downloads/ryde_specification_v2.0.pdf
Melchor C. A. and others (2023) The Syndrome Decoding in the Head (SD-in-the-Head) Signature Scheme. Algorithm Specifications and Supporting Documentation – Version 1.1. URL: https://sdith.org/ docs/sdith-v1.1.pdf
Beullens W. and others (2023) MAYO. Algorithm Specifications. URL: https://pqmayo.org/assets/specs/ mayo.pdf.
Hiroki Furue and others (2025) QR-UOV. Algorithm Specifications. Nippon telegraph and telephone corporation. URL: https://info.isl.ntt.co.jp/crypt/qruov/files/qruov_Spec-v2.0.pdf
SNOVA (2023) Proposal for NIST PQC: Digital Signature Schemes project. Version 1.0. URL: https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/SNOVA-spec-web
Beullens W. and others (2023) UOV: Unbalanced Oil and Vinegar. Algorithm Specifications and Supporting Documentation. Version 1.0. URL: https://drive.google.com/file/d/1NdMHuCyyFG6xgQG rpssM99kyiNwA9JG-/view
Baum C. and others (2025) FAEST v2: Algorithm Specifications. Version 2.0. URL: https://faest.info/ faest-spec-v2.0.pdf.
Copyright (c) 2025 Computer Science and Cybersecurity

This work is licensed under a Creative Commons Attribution 4.0 International License.
