Reference implementations of PQC
No puede seleccionar más de 25 temas Los temas deben comenzar con una letra o número, pueden incluir guiones ('-') y pueden tener hasta 35 caracteres de largo.
 
 
 
 

401 líneas
5.8 KiB

  1. consistency_checks:
  2. - files:
  3. - aes256ctr.c
  4. - aes256ctr.h
  5. - bm.c
  6. - bm.h
  7. - controlbits.c
  8. - controlbits.h
  9. - crypto_hash.h
  10. - decrypt.h
  11. - encrypt.h
  12. - gf.h
  13. - operations.c
  14. - pk_gen.h
  15. - root.c
  16. - root.h
  17. - sk_gen.c
  18. - sk_gen.h
  19. - synd.c
  20. - synd.h
  21. - transpose.c
  22. - transpose.h
  23. - util.h
  24. source:
  25. implementation: clean
  26. scheme: mceliece348864
  27. - files:
  28. - aes256ctr.c
  29. - aes256ctr.h
  30. - controlbits.c
  31. - controlbits.h
  32. - crypto_hash.h
  33. - decrypt.h
  34. - encrypt.h
  35. - operations.c
  36. - pk_gen.h
  37. - sk_gen.c
  38. - sk_gen.h
  39. source:
  40. implementation: vec
  41. scheme: mceliece348864
  42. - files:
  43. - aes256ctr.c
  44. - aes256ctr.h
  45. - bm.c
  46. - bm.h
  47. - controlbits.c
  48. - controlbits.h
  49. - crypto_hash.h
  50. - decrypt.h
  51. - encrypt.h
  52. - gf.h
  53. - operations.c
  54. - pk_gen.h
  55. - root.c
  56. - root.h
  57. - sk_gen.c
  58. - sk_gen.h
  59. - synd.c
  60. - synd.h
  61. - transpose.c
  62. - transpose.h
  63. - util.h
  64. source:
  65. implementation: clean
  66. scheme: mceliece348864f
  67. - files:
  68. - aes256ctr.c
  69. - aes256ctr.h
  70. - controlbits.c
  71. - controlbits.h
  72. - crypto_hash.h
  73. - decrypt.h
  74. - encrypt.h
  75. - operations.c
  76. - pk_gen.h
  77. - sk_gen.c
  78. - sk_gen.h
  79. source:
  80. implementation: vec
  81. scheme: mceliece348864f
  82. - files:
  83. - aes256ctr.c
  84. - aes256ctr.h
  85. - benes.c
  86. - benes.h
  87. - bm.c
  88. - bm.h
  89. - controlbits.c
  90. - controlbits.h
  91. - crypto_hash.h
  92. - decrypt.h
  93. - encrypt.h
  94. - gf.h
  95. - operations.c
  96. - pk_gen.h
  97. - root.c
  98. - root.h
  99. - sk_gen.c
  100. - sk_gen.h
  101. - synd.c
  102. - synd.h
  103. - transpose.c
  104. - transpose.h
  105. - util.c
  106. - util.h
  107. source:
  108. implementation: clean
  109. scheme: mceliece460896
  110. - files:
  111. - aes256ctr.c
  112. - aes256ctr.h
  113. - controlbits.c
  114. - controlbits.h
  115. - crypto_hash.h
  116. - decrypt.h
  117. - encrypt.h
  118. - operations.c
  119. - pk_gen.h
  120. - sk_gen.c
  121. - sk_gen.h
  122. source:
  123. implementation: vec
  124. scheme: mceliece460896
  125. - files:
  126. - aes256ctr.c
  127. - aes256ctr.h
  128. - benes.c
  129. - benes.h
  130. - bm.c
  131. - bm.h
  132. - controlbits.c
  133. - controlbits.h
  134. - crypto_hash.h
  135. - decrypt.h
  136. - encrypt.h
  137. - gf.h
  138. - operations.c
  139. - pk_gen.h
  140. - root.c
  141. - root.h
  142. - sk_gen.c
  143. - sk_gen.h
  144. - synd.c
  145. - synd.h
  146. - transpose.c
  147. - transpose.h
  148. - util.c
  149. - util.h
  150. source:
  151. implementation: clean
  152. scheme: mceliece460896f
  153. - files:
  154. - aes256ctr.c
  155. - aes256ctr.h
  156. - controlbits.c
  157. - controlbits.h
  158. - crypto_hash.h
  159. - decrypt.h
  160. - encrypt.h
  161. - operations.c
  162. - pk_gen.h
  163. - sk_gen.c
  164. - sk_gen.h
  165. source:
  166. implementation: vec
  167. scheme: mceliece460896f
  168. - files:
  169. - aes256ctr.c
  170. - aes256ctr.h
  171. - benes.c
  172. - benes.h
  173. - bm.c
  174. - bm.h
  175. - controlbits.c
  176. - controlbits.h
  177. - crypto_hash.h
  178. - decrypt.h
  179. - encrypt.h
  180. - gf.h
  181. - operations.c
  182. - pk_gen.h
  183. - root.c
  184. - root.h
  185. - sk_gen.c
  186. - sk_gen.h
  187. - synd.c
  188. - synd.h
  189. - transpose.c
  190. - transpose.h
  191. - util.c
  192. - util.h
  193. source:
  194. implementation: clean
  195. scheme: mceliece6688128
  196. - files:
  197. - aes256ctr.c
  198. - aes256ctr.h
  199. - controlbits.c
  200. - controlbits.h
  201. - crypto_hash.h
  202. - decrypt.h
  203. - encrypt.h
  204. - operations.c
  205. - pk_gen.h
  206. - sk_gen.c
  207. - sk_gen.h
  208. source:
  209. implementation: vec
  210. scheme: mceliece6688128
  211. - files:
  212. - aes256ctr.c
  213. - aes256ctr.h
  214. - benes.c
  215. - benes.h
  216. - bm.c
  217. - bm.h
  218. - controlbits.c
  219. - controlbits.h
  220. - crypto_hash.h
  221. - decrypt.h
  222. - encrypt.h
  223. - gf.h
  224. - operations.c
  225. - pk_gen.h
  226. - root.c
  227. - root.h
  228. - sk_gen.c
  229. - sk_gen.h
  230. - synd.c
  231. - synd.h
  232. - transpose.c
  233. - transpose.h
  234. - util.c
  235. - util.h
  236. source:
  237. implementation: clean
  238. scheme: mceliece6688128f
  239. - files:
  240. - aes256ctr.c
  241. - aes256ctr.h
  242. - controlbits.c
  243. - controlbits.h
  244. - crypto_hash.h
  245. - decrypt.h
  246. - encrypt.h
  247. - operations.c
  248. - pk_gen.h
  249. - sk_gen.c
  250. - sk_gen.h
  251. source:
  252. implementation: vec
  253. scheme: mceliece6688128f
  254. - files:
  255. - aes256ctr.c
  256. - aes256ctr.h
  257. - benes.c
  258. - benes.h
  259. - bm.c
  260. - bm.h
  261. - controlbits.c
  262. - controlbits.h
  263. - crypto_hash.h
  264. - decrypt.c
  265. - decrypt.h
  266. - encrypt.c
  267. - encrypt.h
  268. - gf.c
  269. - gf.h
  270. - operations.c
  271. - params.h
  272. - pk_gen.h
  273. - root.c
  274. - root.h
  275. - sk_gen.c
  276. - sk_gen.h
  277. - synd.c
  278. - synd.h
  279. - transpose.c
  280. - transpose.h
  281. - util.c
  282. - util.h
  283. source:
  284. implementation: clean
  285. scheme: mceliece6960119
  286. - files:
  287. - aes256ctr.c
  288. - aes256ctr.h
  289. - controlbits.c
  290. - controlbits.h
  291. - crypto_hash.h
  292. - decrypt.h
  293. - encrypt.h
  294. - operations.c
  295. - params.h
  296. - sk_gen.c
  297. - sk_gen.h
  298. source:
  299. implementation: vec
  300. scheme: mceliece6960119
  301. - files:
  302. - aes256ctr.c
  303. - aes256ctr.h
  304. - api.h
  305. - controlbits.c
  306. - controlbits.h
  307. - crypto_hash.h
  308. - decrypt.h
  309. - encrypt.h
  310. - operations.c
  311. - params.h
  312. - sk_gen.c
  313. - sk_gen.h
  314. source:
  315. implementation: vec
  316. scheme: mceliece6960119f
  317. - files:
  318. - aes256ctr.c
  319. - aes256ctr.h
  320. - benes.c
  321. - benes.h
  322. - bm.c
  323. - bm.h
  324. - controlbits.c
  325. - controlbits.h
  326. - crypto_hash.h
  327. - decrypt.h
  328. - encrypt.h
  329. - gf.h
  330. - operations.c
  331. - pk_gen.h
  332. - root.c
  333. - root.h
  334. - sk_gen.c
  335. - sk_gen.h
  336. - synd.c
  337. - synd.h
  338. - transpose.c
  339. - transpose.h
  340. - util.c
  341. - util.h
  342. source:
  343. implementation: clean
  344. scheme: mceliece8192128
  345. - files:
  346. - aes256ctr.c
  347. - aes256ctr.h
  348. - controlbits.c
  349. - controlbits.h
  350. - crypto_hash.h
  351. - decrypt.h
  352. - encrypt.h
  353. - operations.c
  354. - sk_gen.c
  355. - sk_gen.h
  356. source:
  357. implementation: vec
  358. scheme: mceliece8192128
  359. - files:
  360. - aes256ctr.c
  361. - aes256ctr.h
  362. - benes.c
  363. - benes.h
  364. - bm.c
  365. - bm.h
  366. - controlbits.c
  367. - controlbits.h
  368. - crypto_hash.h
  369. - decrypt.h
  370. - encrypt.h
  371. - gf.h
  372. - operations.c
  373. - pk_gen.h
  374. - root.c
  375. - root.h
  376. - sk_gen.c
  377. - sk_gen.h
  378. - synd.c
  379. - synd.h
  380. - transpose.c
  381. - transpose.h
  382. - util.c
  383. - util.h
  384. source:
  385. implementation: clean
  386. scheme: mceliece8192128f
  387. - files:
  388. - aes256ctr.c
  389. - aes256ctr.h
  390. - controlbits.c
  391. - controlbits.h
  392. - crypto_hash.h
  393. - decrypt.h
  394. - encrypt.h
  395. - operations.c
  396. - sk_gen.c
  397. - sk_gen.h
  398. source:
  399. implementation: vec
  400. scheme: mceliece8192128f