Joost Rijneveld
8befb0d550
Add SHAKE128 and SHAKE256
...
This also performs numerous consistency fixes
2017-06-02 17:29:14 +02:00
Joost Rijneveld
5122ac6f73
Reduce code duplication
...
A large number of functions was repeated in xmss_fast; these are now
shared between the two implementations via the xmss_commons file.
Notably, we ensure compatability by sharing the verification functions.
2017-06-02 14:46:30 +02:00
Joost Rijneveld
1e00c92c18
Refactor to use compile-time parameter sets
...
This starts a cleanup / refactor, but there is still some low-hanging fruit.
2017-06-02 14:10:24 +02:00
Joost Rijneveld
d4bc8656e3
Fix bug in addressing during fast xmssmt key gen
2017-05-31 16:43:12 +02:00
Andreas
9f512fa8dc
v06
2016-09-22 16:31:41 +02:00
Andreas
ddddfd9739
handle that most machines are little endian but addresses here are big endian...
2016-07-12 16:19:42 +02:00
Andreas
2c290d39be
upgraded to draft-06
2016-07-11 11:15:16 +02:00
Andreas
c37b9dcfca
SWITCH from v01 to v03
...
Versions are incompatible due to different address formats and differing message compression!
2016-02-16 16:31:18 +01:00
Andreas
59a4846fbd
changed version date
...
Merge branch 'master' of bitbucket.org:ahuelsing/xmss_ref
2016-02-10 16:00:07 +01:00
Andreas
622a9513b1
local changes
2016-02-10 15:57:16 +01:00
Joost Rijneveld
c1f0721f4a
Also fix int overflow for systems with 4-byte ULs
2016-02-08 12:11:52 +01:00
Joost Rijneveld
951848fe89
Remove redundant address changes
2016-02-05 15:30:00 +01:00
Joost Rijneveld
e2f1cee548
Fix error for d=1 cases as introduced by 719cb46
2016-02-03 14:05:48 +01:00
Joost Rijneveld
1e503b665e
Make codestyle more consistent, fix -Wextra warns
2016-02-02 14:11:23 +01:00
Joost Rijneveld
719cb467df
Prevent allocating for a 'next' tree on top layer
2016-02-01 17:21:09 +01:00
Joost Rijneveld
8cbbfe0f05
Prevent int overflow for h >= 32
2016-02-01 07:53:27 +01:00
Joost Rijneveld
97331f09c0
Fix update bug (partially re-implement BDS)
...
The bug occured for cases where d=3 and indicated
a lack of updates. Re-implementing the higher-level
structure of BDS resolved this.
2016-01-28 17:52:08 +01:00
Joost Rijneveld
17c5b2842f
Make address masks more explicit and strict
2016-01-27 10:18:31 +01:00
Andreas
9d9b782ff9
added support for n = m = 64
2015-10-28 15:49:46 +01:00
Joost Rijneveld
f5a5231c72
Do not perform bds_round for the last leaf
2015-10-28 13:45:05 +01:00
Joost Rijneveld
2af61cea82
Check if a NEXT-tree exists before updating it
2015-10-05 21:57:10 +02:00
Joost Rijneveld
4c19fe61e4
Make XMSSMT also use BDS tree traversal
2015-09-21 13:24:42 +02:00
Joost Rijneveld
a075747462
Store BDS state in passable struct, not in globals
2015-08-27 09:39:06 +02:00
Joost Rijneveld
a33aef699c
Adhere to more strict storage bounds
2015-08-26 15:53:50 +02:00
Joost Rijneveld
5d469d118f
Use BDS for auth paths in XMSS (but not XMSSMT yet)
2015-08-26 14:54:01 +02:00
Joost Rijneveld
1511c0bdf7
Add xmss_fast starting point before BDS
2015-08-21 15:06:07 +02:00