▶️ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant.
✅️ Bonus: it even outperforms Google's prototype. 👀
Full write-up here: https://neodyme.io/en/blog/pqc-fido/
@neodyme having implemented sphincs+ long ago on a m3 - i'm not surprised about the speed constraints you encountered. the way you solved it is interesting. i wonder does a regular verifier with standard q value does verify your sigs?
@stf Yes, that's the key detail 🙂 The signer and verifier both need to use the exact same parameter set. If those differ (e.g., different q), verification won't work. With matching parameters though, a regular verifier will handle the sigs just fine. No re-implementation needed.