moved license to one license file
This commit is contained in:
parent
7cbeeaee59
commit
17ea905952
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <H_Q_matrices_generation.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#include "H_Q_matrices_generation.h"
|
#include "H_Q_matrices_generation.h"
|
||||||
#include "gf2x_arith_mod_xPplusOne.h"
|
#include "gf2x_arith_mod_xPplusOne.h"
|
||||||
|
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <H_Q_matrices_generation.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
#include "qc_ldpc_parameters.h"
|
#include "qc_ldpc_parameters.h"
|
||||||
#include "gf2x_limbs.h"
|
#include "gf2x_limbs.h"
|
||||||
|
@ -1,34 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <bf_decoding.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
#include "bf_decoding.h"
|
#include "bf_decoding.h"
|
||||||
#include "gf2x_arith_mod_xPplusOne.h"
|
#include "gf2x_arith_mod_xPplusOne.h"
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
@ -1,36 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <bf_decoding.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
#include "qc_ldpc_parameters.h"
|
#include "qc_ldpc_parameters.h"
|
||||||
#include "gf2x_limbs.h"
|
#include "gf2x_limbs.h"
|
||||||
@ -74,5 +41,3 @@ int bf_decoding(DIGIT err[],
|
|||||||
#define B0 88
|
#define B0 88
|
||||||
#define T_BAR 6
|
#define T_BAR 6
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,36 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <gf2x_arith.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
|
|
||||||
#include "gf2x_arith.h"
|
#include "gf2x_arith.h"
|
||||||
#include <string.h> // memset(...)
|
#include <string.h> // memset(...)
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <gf2x_arith.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "gf2x_limbs.h"
|
#include "gf2x_limbs.h"
|
||||||
|
@ -1,36 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <gf2x_arith_mod_xPplusOne.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
|
|
||||||
#include "gf2x_arith_mod_xPplusOne.h"
|
#include "gf2x_arith_mod_xPplusOne.h"
|
||||||
#include "rng.h"
|
#include "rng.h"
|
||||||
#include <string.h> // memcpy(...), memset(...)
|
#include <string.h> // memcpy(...), memset(...)
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <gf2x_arith_mod_xPplusOne.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "gf2x_limbs.h"
|
#include "gf2x_limbs.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <gf2x_limbs.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
/*----------------------------------------------------------------------------*/
|
/*----------------------------------------------------------------------------*/
|
||||||
@ -91,4 +59,3 @@ typedef CAT( uint, CPU_WORD_BITS, _t ) DIGIT;
|
|||||||
|
|
||||||
#define POSITION_T uint32_t
|
#define POSITION_T uint32_t
|
||||||
/*----------------------------------------------------------------------------*/
|
/*----------------------------------------------------------------------------*/
|
||||||
|
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <kem.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#include "niederreiter_keygen.h"
|
#include "niederreiter_keygen.h"
|
||||||
#include "niederreiter_encrypt.h"
|
#include "niederreiter_encrypt.h"
|
||||||
#include "niederreiter_decrypt.h"
|
#include "niederreiter_decrypt.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
#include "qc_ldpc_parameters.h"
|
#include "qc_ldpc_parameters.h"
|
||||||
#include "gf2x_limbs.h"
|
#include "gf2x_limbs.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_decrypt.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#include "niederreiter_decrypt.h"
|
#include "niederreiter_decrypt.h"
|
||||||
|
|
||||||
#include "qc_ldpc_parameters.h"
|
#include "qc_ldpc_parameters.h"
|
||||||
@ -149,5 +117,3 @@ int decrypt_niederreiter(DIGIT err[], // N0 circ poly
|
|||||||
} // end decrypt_niederreiter
|
} // end decrypt_niederreiter
|
||||||
|
|
||||||
/*----------------------------------------------------------------------------*/
|
/*----------------------------------------------------------------------------*/
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_decrypt.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "niederreiter.h"
|
#include "niederreiter.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_encrypt.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#include "niederreiter_encrypt.h"
|
#include "niederreiter_encrypt.h"
|
||||||
#include "qc_ldpc_parameters.h"
|
#include "qc_ldpc_parameters.h"
|
||||||
#include "gf2x_arith_mod_xPplusOne.h"
|
#include "gf2x_arith_mod_xPplusOne.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_encrypt.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "niederreiter.h"
|
#include "niederreiter.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_keygen.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#include "niederreiter_keygen.h"
|
#include "niederreiter_keygen.h"
|
||||||
|
|
||||||
#include "H_Q_matrices_generation.h"
|
#include "H_Q_matrices_generation.h"
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <niederreiter_keygen.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "niederreiter.h"
|
#include "niederreiter.h"
|
||||||
|
@ -1,34 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <qc_ldpc_parameters.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
#pragma once
|
#pragma once
|
||||||
// CATEGORY defined in the makefile
|
// CATEGORY defined in the makefile
|
||||||
|
|
||||||
|
@ -1,36 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <rng.c>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
|
|
||||||
#include "rng.h"
|
#include "rng.h"
|
||||||
|
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
|
@ -1,35 +1,3 @@
|
|||||||
/**
|
|
||||||
*
|
|
||||||
* <rng.h>
|
|
||||||
*
|
|
||||||
* @version 2.0 (March 2019)
|
|
||||||
*
|
|
||||||
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins.
|
|
||||||
*
|
|
||||||
* In alphabetical order:
|
|
||||||
*
|
|
||||||
* @author Marco Baldi <m.baldi@univpm.it>
|
|
||||||
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it>
|
|
||||||
* @author Franco Chiaraluce <f.chiaraluce@univpm.it>
|
|
||||||
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it>
|
|
||||||
* @author Paolo Santini <p.santini@pm.univpm.it>
|
|
||||||
*
|
|
||||||
* This code is hereby placed in the public domain.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
|
||||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
||||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
|
||||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
||||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
||||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
||||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
||||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
||||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
||||||
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
**/
|
|
||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
/****** From this point on, the code was supplied by NIST ****************/
|
/****** From this point on, the code was supplied by NIST ****************/
|
||||||
|
Loading…
Reference in New Issue
Block a user