1
1
mirror of https://github.com/henrydcase/pqc.git synced 2024-11-22 15:39:07 +00:00
pqcrypto/crypto_kem
John M. Schanck 42473fab3b Revert "ms compiler changes for fft.c"
This reverts commit 99bed07f64.
2021-03-24 21:02:48 +00:00
..
firesaber Fix overflow in multiplication in Saber 2021-03-24 21:02:46 +00:00
frodokem640aes Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
frodokem640shake Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
frodokem976aes Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
frodokem976shake Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
frodokem1344aes Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
frodokem1344shake Fix timing leak in decapsulation. 2021-03-24 21:02:46 +00:00
hqc-128 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
hqc-192 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
hqc-256 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
hqc-rmrs-128 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
hqc-rmrs-192 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
hqc-rmrs-256 Revert "ms compiler changes for fft.c" 2021-03-24 21:02:48 +00:00
kyber512 Fix reduce.c's overflowing multiplication 2021-03-24 21:02:46 +00:00
kyber512-90s Use the right AES CTX 2021-03-24 21:02:46 +00:00
kyber768 Kyber768 and Kyber1024 don't need -maes (see #296) 2021-03-24 21:02:46 +00:00
kyber768-90s Use the right AES CTX 2021-03-24 21:02:46 +00:00
kyber1024 Kyber768 and Kyber1024 don't need -maes (see #296) 2021-03-24 21:02:46 +00:00
kyber1024-90s Use the right AES CTX 2021-03-24 21:02:46 +00:00
lightsaber Fix overflow in multiplication in Saber 2021-03-24 21:02:46 +00:00
mceliece348864 Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece348864f Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece460896 Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece460896f Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece6688128 Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece6688128f Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece6960119 Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece6960119f Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece8192128 Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
mceliece8192128f Split aes*_keyexp up into ecb and ctr variants 2021-03-24 21:02:46 +00:00
ntruhps2048509 NTRU: inline the one call that needed @plt 2021-03-24 21:02:46 +00:00
ntruhps2048677 NTRU: inline the one call that needed @plt 2021-03-24 21:02:46 +00:00
ntruhps4096821 NTRU: inline the one call that needed @plt 2021-03-24 21:02:46 +00:00
ntruhrss701 NTRU: remove unused .s file 2021-03-24 21:02:46 +00:00
ntrulpr653 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00
ntrulpr761 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00
ntrulpr857 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00
saber Fix overflow in multiplication in Saber 2021-03-24 21:02:46 +00:00
sntrup653 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00
sntrup761 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00
sntrup857 NTRU Prime: Get random bytes in one shot and use corresponding KATs 2021-03-24 21:02:47 +00:00