From 17ea905952189df80f84976feadb4883536dddfc Mon Sep 17 00:00:00 2001 From: Leon Date: Sun, 19 May 2019 19:52:19 +0200 Subject: [PATCH] moved license to one license file --- .../clean/H_Q_matrices_generation.c | 32 ----------------- .../clean/H_Q_matrices_generation.h | 32 ----------------- crypto_kem/ledakemlt12/clean/bf_decoding.c | 31 ---------------- crypto_kem/ledakemlt12/clean/bf_decoding.h | 35 ------------------- crypto_kem/ledakemlt12/clean/gf2x_arith.c | 33 ----------------- crypto_kem/ledakemlt12/clean/gf2x_arith.h | 32 ----------------- .../clean/gf2x_arith_mod_xPplusOne.c | 33 ----------------- .../clean/gf2x_arith_mod_xPplusOne.h | 32 ----------------- crypto_kem/ledakemlt12/clean/gf2x_limbs.h | 33 ----------------- crypto_kem/ledakemlt12/clean/kem.c | 32 ----------------- crypto_kem/ledakemlt12/clean/niederreiter.h | 32 ----------------- .../ledakemlt12/clean/niederreiter_decrypt.c | 34 ------------------ .../ledakemlt12/clean/niederreiter_decrypt.h | 32 ----------------- .../ledakemlt12/clean/niederreiter_encrypt.c | 32 ----------------- .../ledakemlt12/clean/niederreiter_encrypt.h | 32 ----------------- .../ledakemlt12/clean/niederreiter_keygen.c | 32 ----------------- .../ledakemlt12/clean/niederreiter_keygen.h | 32 ----------------- .../ledakemlt12/clean/qc_ldpc_parameters.h | 31 ---------------- crypto_kem/ledakemlt12/clean/rng.c | 33 ----------------- crypto_kem/ledakemlt12/clean/rng.h | 32 ----------------- 20 files changed, 647 deletions(-) diff --git a/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.c b/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.c index 703f316b..65d1d115 100644 --- a/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.c +++ b/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.c @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #include "H_Q_matrices_generation.h" #include "gf2x_arith_mod_xPplusOne.h" diff --git a/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.h b/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.h index 98a67b51..fd4ee385 100644 --- a/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.h +++ b/crypto_kem/ledakemlt12/clean/H_Q_matrices_generation.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "qc_ldpc_parameters.h" #include "gf2x_limbs.h" diff --git a/crypto_kem/ledakemlt12/clean/bf_decoding.c b/crypto_kem/ledakemlt12/clean/bf_decoding.c index e0801a2d..2c9156cb 100644 --- a/crypto_kem/ledakemlt12/clean/bf_decoding.c +++ b/crypto_kem/ledakemlt12/clean/bf_decoding.c @@ -1,34 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ #include "bf_decoding.h" #include "gf2x_arith_mod_xPplusOne.h" #include diff --git a/crypto_kem/ledakemlt12/clean/bf_decoding.h b/crypto_kem/ledakemlt12/clean/bf_decoding.h index b14173c2..1c8b5852 100644 --- a/crypto_kem/ledakemlt12/clean/bf_decoding.h +++ b/crypto_kem/ledakemlt12/clean/bf_decoding.h @@ -1,36 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - - #pragma once #include "qc_ldpc_parameters.h" #include "gf2x_limbs.h" @@ -74,5 +41,3 @@ int bf_decoding(DIGIT err[], #define B0 88 #define T_BAR 6 #endif - - diff --git a/crypto_kem/ledakemlt12/clean/gf2x_arith.c b/crypto_kem/ledakemlt12/clean/gf2x_arith.c index d502741c..745fb0fc 100644 --- a/crypto_kem/ledakemlt12/clean/gf2x_arith.c +++ b/crypto_kem/ledakemlt12/clean/gf2x_arith.c @@ -1,36 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - - #include "gf2x_arith.h" #include // memset(...) #include diff --git a/crypto_kem/ledakemlt12/clean/gf2x_arith.h b/crypto_kem/ledakemlt12/clean/gf2x_arith.h index fb966ad6..08e15989 100644 --- a/crypto_kem/ledakemlt12/clean/gf2x_arith.h +++ b/crypto_kem/ledakemlt12/clean/gf2x_arith.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "gf2x_limbs.h" diff --git a/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.c b/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.c index a099ecfb..f8858d95 100644 --- a/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.c +++ b/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.c @@ -1,36 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - - #include "gf2x_arith_mod_xPplusOne.h" #include "rng.h" #include // memcpy(...), memset(...) diff --git a/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.h b/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.h index ce3e2e86..acc0919c 100644 --- a/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.h +++ b/crypto_kem/ledakemlt12/clean/gf2x_arith_mod_xPplusOne.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "gf2x_limbs.h" diff --git a/crypto_kem/ledakemlt12/clean/gf2x_limbs.h b/crypto_kem/ledakemlt12/clean/gf2x_limbs.h index 6ced9310..7e331084 100644 --- a/crypto_kem/ledakemlt12/clean/gf2x_limbs.h +++ b/crypto_kem/ledakemlt12/clean/gf2x_limbs.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once /*----------------------------------------------------------------------------*/ @@ -91,4 +59,3 @@ typedef CAT( uint, CPU_WORD_BITS, _t ) DIGIT; #define POSITION_T uint32_t /*----------------------------------------------------------------------------*/ - diff --git a/crypto_kem/ledakemlt12/clean/kem.c b/crypto_kem/ledakemlt12/clean/kem.c index 28b55695..f9903718 100644 --- a/crypto_kem/ledakemlt12/clean/kem.c +++ b/crypto_kem/ledakemlt12/clean/kem.c @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #include "niederreiter_keygen.h" #include "niederreiter_encrypt.h" #include "niederreiter_decrypt.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter.h b/crypto_kem/ledakemlt12/clean/niederreiter.h index 34c05e73..e7ba199d 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter.h +++ b/crypto_kem/ledakemlt12/clean/niederreiter.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "qc_ldpc_parameters.h" #include "gf2x_limbs.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.c b/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.c index 13023318..9b34215e 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.c +++ b/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.c @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #include "niederreiter_decrypt.h" #include "qc_ldpc_parameters.h" @@ -149,5 +117,3 @@ int decrypt_niederreiter(DIGIT err[], // N0 circ poly } // end decrypt_niederreiter /*----------------------------------------------------------------------------*/ - - diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.h b/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.h index 7ac486e0..66938700 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.h +++ b/crypto_kem/ledakemlt12/clean/niederreiter_decrypt.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "niederreiter.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.c b/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.c index a4ed2b4a..fb075873 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.c +++ b/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.c @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #include "niederreiter_encrypt.h" #include "qc_ldpc_parameters.h" #include "gf2x_arith_mod_xPplusOne.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.h b/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.h index 9da712f7..e69f0120 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.h +++ b/crypto_kem/ledakemlt12/clean/niederreiter_encrypt.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "niederreiter.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_keygen.c b/crypto_kem/ledakemlt12/clean/niederreiter_keygen.c index 9e5a7a32..679e6716 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_keygen.c +++ b/crypto_kem/ledakemlt12/clean/niederreiter_keygen.c @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #include "niederreiter_keygen.h" #include "H_Q_matrices_generation.h" diff --git a/crypto_kem/ledakemlt12/clean/niederreiter_keygen.h b/crypto_kem/ledakemlt12/clean/niederreiter_keygen.h index ae5210b7..a775028b 100644 --- a/crypto_kem/ledakemlt12/clean/niederreiter_keygen.h +++ b/crypto_kem/ledakemlt12/clean/niederreiter_keygen.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once #include "niederreiter.h" diff --git a/crypto_kem/ledakemlt12/clean/qc_ldpc_parameters.h b/crypto_kem/ledakemlt12/clean/qc_ldpc_parameters.h index ab43d044..be88e080 100644 --- a/crypto_kem/ledakemlt12/clean/qc_ldpc_parameters.h +++ b/crypto_kem/ledakemlt12/clean/qc_ldpc_parameters.h @@ -1,34 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ #pragma once // CATEGORY defined in the makefile diff --git a/crypto_kem/ledakemlt12/clean/rng.c b/crypto_kem/ledakemlt12/clean/rng.c index cff6f77f..02382074 100644 --- a/crypto_kem/ledakemlt12/clean/rng.c +++ b/crypto_kem/ledakemlt12/clean/rng.c @@ -1,36 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - - #include "rng.h" #include diff --git a/crypto_kem/ledakemlt12/clean/rng.h b/crypto_kem/ledakemlt12/clean/rng.h index 6615c529..5e7724bc 100644 --- a/crypto_kem/ledakemlt12/clean/rng.h +++ b/crypto_kem/ledakemlt12/clean/rng.h @@ -1,35 +1,3 @@ -/** - * - * - * - * @version 2.0 (March 2019) - * - * Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. - * - * In alphabetical order: - * - * @author Marco Baldi - * @author Alessandro Barenghi - * @author Franco Chiaraluce - * @author Gerardo Pelosi - * @author Paolo Santini - * - * This code is hereby placed in the public domain. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS - * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR - * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF - * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR - * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, - * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE - * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, - * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - **/ - #pragma once /****** From this point on, the code was supplied by NIST ****************/