Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.
Joost Rijneveld df9fe909fc
Compute sk size after defining BDS k parameter
il y a 7 ans
test Make XMSSMT WOTS memory usage more accurate il y a 7 ans
ui Remove fixed message length from UI il y a 7 ans
.gitignore Clean up tests il y a 7 ans
LICENSE Simplify licensing using LICENSE file il y a 7 ans
Makefile Clean up tests il y a 7 ans
README.md Clarify current BDS traversal support il y a 7 ans
fips202.c Clean up includes il y a 7 ans
fips202.h Perform various reformatting / renaming il y a 7 ans
hash.c Reorder ull_to_bytes parameters to group output il y a 7 ans
hash.h Perform various reformatting / renaming il y a 7 ans
hash_address.c Rename parameters for readability and consistency il y a 7 ans
hash_address.h Rename parameters for readability and consistency il y a 7 ans
params.c Compute sk size after defining BDS k parameter il y a 7 ans
params.h Let xmss_core decide on secret key size il y a 7 ans
randombytes.c Refactor for more consistent style and readability il y a 7 ans
randombytes.h Perform various reformatting / renaming il y a 7 ans
wots.c Reorder ull_to_bytes parameters to group output il y a 7 ans
wots.h Refactor and deduplicate WOTS il y a 7 ans
xmss.c Revert to using runtime-only parameter struct il y a 7 ans
xmss.h Perform various reformatting / renaming il y a 7 ans
xmss_commons.c Make XMSS sign/open functions instances of XMSSMT il y a 7 ans
xmss_commons.h Clean up signing functions il y a 7 ans
xmss_core.c Let xmss_core decide on secret key size il y a 7 ans
xmss_core.h Let xmss_core decide on secret key size il y a 7 ans
xmss_core_fast.c Let xmss_core decide on secret key size il y a 7 ans
xmss_core_fast.h Let xmss_core decide on secret key size il y a 7 ans

README.md

XMSS reference code

This repository contains the reference implementation that accompanies the Internet Draft “XMSS: Extended Hash-Based Signatures”, draft-irtf-cfrg-xmss-hash-based-signatures.

This reference implementation supports all parameter sets as defined in the Draft at run-time (specified by prefixing the public and private keys with a 32-bit oid). Implementations that want to use compile-time parameter sets can remove the struct xmss_params function parameter.

While the behavior of the code in this repository is supposed to be stable, the API is not yet fully complete. In particular, the wrapper for run-time parameters does not yet support the back-end functions that make use of BDS traversal. This means that the xmss_core_fast.c back-end is somewhat hard to use. This is the most immediate open TODO, and will be resolved soon.

When using the current code base, please be careful, expect changes and watch this document for further documentation.

Dependencies

For the SHA-2 hash functions (i.e. SHA-256 and SHA-512), we rely on OpenSSL. Make sure to install the OpenSSL development headers. On Debian-based systems, this is achieved by installing the OpenSSL development package libssl-dev.

License

This reference implementation was written by Andreas Hülsing and Joost Rijneveld. All included code is available under the CC0 1.0 Universal Public Domain Dedication.