Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | private-key: Add optional parameters argument to sign() method | Tobias Brunner | 2017-11-08 | 1 | -1/+1 |
| | |||||
* | bliss: bliss_sampler expects XOF type | Andreas Steffen | 2016-09-22 | 1 | -4/+3 |
| | |||||
* | mgf1: Refactored MGF1 as an XOF | Andreas Steffen | 2016-09-21 | 1 | -9/+10 |
| | |||||
* | integrity-test: Added bliss_param_sets to read-only segment | Andreas Steffen | 2016-07-29 | 1 | -2/+2 |
| | |||||
* | Created libnttfft | Andreas Steffen | 2016-07-29 | 1 | -14/+14 |
| | | | | | This makes Number Theoretic Transforms (NTT) based on the efficient Fast-Fourier-Transform (FFT) available to multiple plugins. | ||||
* | bliss: Implemented FFT with fast Montgomery arithmetic | Andreas Steffen | 2016-07-29 | 1 | -12/+32 |
| | |||||
* | Explicitly mention SHA2 algorithm in BLISS OIDs and signature schemes | Andreas Steffen | 2015-11-06 | 1 | -3/+3 |
| | |||||
* | Support BLISS signatures with SHA-3 hash | Andreas Steffen | 2015-11-03 | 1 | -0/+6 |
| | |||||
* | Use MGF1 with SHA-512 as BLISS random oracle | Andreas Steffen | 2015-07-27 | 1 | -12/+6 |
| | |||||
* | Fixed compiler warnings | Andreas Steffen | 2015-02-27 | 1 | -2/+3 |
| | |||||
* | Allow SHA256 and SHA384 data hash for BLISS signatures. | Andreas Steffen | 2015-02-26 | 1 | -19/+32 |
| | | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle. | ||||
* | Check for null pointer before applying memwipe() | Andreas Steffen | 2015-02-25 | 1 | -4/+10 |
| | |||||
* | Implemented improved BLISS-B signature algorithm | Andreas Steffen | 2015-02-25 | 1 | -27/+209 |
| | |||||
* | bliss: Make sure sampler exists after checking for it earlier | Tobias Brunner | 2014-12-23 | 1 | -2/+2 |
| | |||||
* | Also initialize s_sign | Andreas Steffen | 2014-12-12 | 1 | -1/+1 |
| | |||||
* | Fix ambiguities and gcc compiler warning | Andreas Steffen | 2014-12-12 | 1 | -3/+3 |
| | |||||
* | Use Huffman code in BLISS signature | Andreas Steffen | 2014-12-12 | 1 | -2/+7 |
| | |||||
* | bliss: Fix compilation warning with certain GCC versions | Tobias Brunner | 2014-12-12 | 1 | -1/+2 |
| | | | | | | Theoretically, n could be zero and these variables are then used uninitialized. Older GCC versions warn about this and on Travis where we compile with -Werror this causes the tests to fail. | ||||
* | Pack private key arrays | Andreas Steffen | 2014-12-10 | 1 | -17/+75 |
| | |||||
* | Applied bit packing to BLISS public key | Andreas Steffen | 2014-11-29 | 1 | -7/+6 |
| | |||||
* | Wipe BLISS private key memory | Andreas Steffen | 2014-11-29 | 1 | -2/+8 |
| | |||||
* | Store NTT A of BLISS public key a | Andreas Steffen | 2014-11-29 | 1 | -20/+17 |
| | |||||
* | Finished BLISS signature generation | Andreas Steffen | 2014-11-29 | 1 | -58/+287 |
| | |||||
* | Implemented Gaussian rejection sampler | Andreas Steffen | 2014-11-29 | 1 | -14/+90 |
| | | | | | The bliss_sampler class uses the mgf1_bitspender as a pseudo-random source. | ||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 1 | -4/+4 |
| | |||||
* | Store and parse BLISS private and public keys in DER and PEM format | Andreas Steffen | 2014-11-29 | 1 | -21/+179 |
| | | | | | | | | Additionally generate SHA-1 fingerprints of raw BLISS subjectPublicKey and subjectPublicKeyInfo objects. Some basic functions used by the bliss_public_key class are shared with the bliss_private_key class. | ||||
* | Use mgf1_bitspender to generate random secret key | Andreas Steffen | 2014-11-29 | 1 | -280/+226 |
| | |||||
* | Defined BLISS I and IV parameter sets | Andreas Steffen | 2014-11-29 | 1 | -19/+147 |
| | |||||
* | Implemented Number Theoretic Transform using the FFT algorithm | Andreas Steffen | 2014-11-29 | 1 | -0/+304 |
| | | | | | | By pre-multiplying the input arrays with a linear phase the fast multiplication via FFT and inverse FFT computes a negative wrapped convolution corresponding to a modulus of x^n+1. | ||||
* | Created framework for BLISS post-quantum signature algorithm | Andreas Steffen | 2014-11-29 | 1 | -0/+207 |