Significant attack on post-quantum signature SPHINCS+ published before Nov 2026
1
15
Ṁ10Ṁ70
2026
41%
chance
1D
1W
1M
ALL
Resolves Yes, if, before November 2026, an attack on quantum or conventional computer of the signature scheme SPHINCS+ (1) is published (preprint, journal article or conference proceeding), that leads to NIST dropping the algorithm from its post-quantum standard, or discouraging its use; or alternatively, if multiple recognized/leading cryptographers recommend against its use.
I reserve the right to discuss in the comments, temporarily halt trading, and possibly even resolve N/A on ambiguity. Suggestions and comments on resolution criteria are welcome if made well in advance of the resolving event
Get Ṁ600 play money
Related questions
Significant attack on post-quantum KEM Kyber published before Nov 2026
56% chance
Significant attack on post-quantum signature FALCON published before Nov 2026
41% chance
[Metaculus] Will a major cyberattack/malware use LLMs in some important way before January 1st, 2025? [Ṁ1000 subsidy]
60% chance
Significant attack on post-quantum signature Dilithium published before Nov 2026
50% chance
"The Verge": Fully SNARKed Ethereum by 2027-02-06?
52% chance
Will a major AI lab announce that the weights of one of its models were compromised in a cyberattack before 2027?
65% chance
Will Quantum computing break RSA encryption before 2030?
20% chance
Will a supply chain attack akin to the xz backdoor targeting developer toolchains be discovered before 2025?
29% chance
Will a quantum computer factor a 6-bit number before 2026?
25% chance