|
|
@@ -0,0 +1,32 @@ |
|
|
|
/** |
|
|
|
* |
|
|
|
* LEDAcryptKEM |
|
|
|
* |
|
|
|
* @version 2.0 (March 2019) |
|
|
|
* |
|
|
|
* Reference ISO-C11 Implementation of the LEDAcrypt KEM-LT cipher using GCC built-ins. |
|
|
|
* Also contains public domain implementations of AES and Keccak |
|
|
|
* |
|
|
|
* In alphabetical order: |
|
|
|
* |
|
|
|
* @author Marco Baldi <m.baldi@univpm.it> |
|
|
|
* @author Alessandro Barenghi <alessandro.barenghi@polimi.it> |
|
|
|
* @author Franco Chiaraluce <f.chiaraluce@univpm.it> |
|
|
|
* @author Gerardo Pelosi <gerardo.pelosi@polimi.it> |
|
|
|
* @author Paolo Santini <p.santini@pm.univpm.it> |
|
|
|
* |
|
|
|
* This code is hereby placed in the public domain. |
|
|
|
* |
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS |
|
|
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE |
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
|
|
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
|
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
|
|
|
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, |
|
|
|
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
|
|
* |
|
|
|
**/ |