montana/iOS/liboqs/docs/algorithms/sig/slh_dsa.md

1431 lines
176 KiB
Markdown
Raw Normal View History

# SLH-DSA
- **Algorithm type**: Digital signature scheme.
- **Main cryptographic assumption**: hash-based signatures.
- **Principal submitters**: Andreas Hülsing.
- **Auxiliary submitters**: Daniel J. Bernstein, Christoph Dobraunig, Maria Eichlseder, Scott Fluhrer, Stefan-Lukas Gazdag, Panos Kampanakis, Stefan Kolbl, Tanja Lange, Martin M Lauridsen, Florian Mendel, Ruben Niederhagen, Christian Rechberger, Joost Rijneveld, Peter Schwabe, Jean-Philippe Aumasson, Bas Westerbaan, Ward Beullens.
- **Authors' website**: https://csrc.nist.gov/pubs/fips/205/final
- **Specification version**: SLH-DSA.
- **Primary Source**<a name="primary-source"></a>:
- **Source**: https://github.com/pq-code-package/slhdsa-c/commit/a0fc1ff253930060d0246aebca06c2538eb92b88
- **Implementation license (SPDX-Identifier)**: MIT or ISC or Apache 2.0
- **Optimized Implementation sources**:
- **slhdsa-c**:<a name="slhdsa-c"></a>
- **Source**: https://github.com/pq-code-package/slhdsa-c/commit/a0fc1ff253930060d0246aebca06c2538eb92b88
- **Implementation license (SPDX-Identifier)**: MIT or ISC or Apache 2.0
## Parameter set summary
| Parameter set | Parameter set alias | Security model | Claimed NIST Level | Public key size (bytes) | Secret key size (bytes) | Signature size (bytes) |
|:----------------------------------------------:|:----------------------|:-----------------|---------------------:|--------------------------:|--------------------------:|-------------------------:|
| SLH\_DSA\_PURE\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_PURE\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_PURE\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_PURE\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_PURE\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_PURE\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_PURE\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_PURE\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_PURE\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_PURE\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_PURE\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_PURE\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_128S | NA | EUF-CMA | 1 | 32 | 64 | 7856 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_128F | NA | EUF-CMA | 1 | 32 | 64 | 17088 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_192S | NA | EUF-CMA | 3 | 48 | 96 | 16224 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_192F | NA | EUF-CMA | 3 | 48 | 96 | 35664 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_256S | NA | EUF-CMA | 5 | 64 | 128 | 29792 |
| SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
| SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_256F | NA | EUF-CMA | 5 | 64 | 128 | 49856 |
## SLH\_DSA\_PURE\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage?‡ |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:----------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
‡For an explanation of what this denotes, consult the [Explanation of Terms](#explanation-of-terms) section at the end of this file.
## SLH\_DSA\_PURE\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_PURE\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHA2\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_128S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_128F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_192S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_192F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_256S implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_224\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_256\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_384\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_224\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA2\_512\_256\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_224\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_256\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_384\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHA3\_512\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_128\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## SLH\_DSA\_SHAKE\_256\_PREHASH\_SHAKE\_256F implementation characteristics
| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
| [Primary Source](#primary-source) | slhdsa-c | All | All | None | False | False | True |
Are implementations chosen based on runtime CPU feature detection? **Yes**.
## Explanation of Terms
- **Large Stack Usage**: Implementations identified as having such may cause failures when running in threads or in constrained environments.