Significant attack on post-quantum signature SPHINCS+ published before Nov 2026
Mini
2
Ṁ1412026
10%
chance
1D
1W
1M
ALL
Resolves Yes, if, before November 2026, an attack on quantum or conventional computer of the signature scheme SPHINCS+ (1) is published (preprint, journal article or conference proceeding), that leads to NIST dropping the algorithm from its post-quantum standard, or discouraging its use; or alternatively, if multiple recognized/leading cryptographers recommend against its use.
I reserve the right to discuss in the comments, temporarily halt trading, and possibly even resolve N/A on ambiguity. Suggestions and comments on resolution criteria are welcome if made well in advance of the resolving event
Get
1,000
and1.00
Related questions
Related questions
Significant attack on post-quantum signature Dilithium published before Nov 2026
34% chance
Significant attack on post-quantum signature FALCON published before Nov 2026
41% chance
Significant attack on post-quantum KEM Kyber published before Nov 2026
53% chance
Will a plausible post-quantum proof obfuscator be found by end of 2024?
30% chance
Will Quantum computing break RSA encryption before 2030?
34% chance
SHA-256 broken by quantum computer before 2030
43% chance
Did the NSA work to weaken post-quantum cryptography?
60% chance
Will a quantum computer factor a 6-bit number before 2026?
44% chance
Will quantum computers, or any other type of computer, be able to crack bitcoin's ECDSA signatures before 2050?
24% chance
Before what year will a quantum computer factor the RSA-2048 challenge number?