Accueil > Research > Code-based cryptography > Code-based cryptosystems : implementations
Code-based cryptosystems : implementations
You can find here some links to implementations of several code-based cryptosystems.
Thanks to :
CBCrypto
Ruhr-Universität Bochum
Eric Arnoult
Daniel Demmler and David Meier
Gerhard Hoffman
Lucas Rothamel and Manuel Weiel
Julian Oleg Arenz and Sarah Magin
Marius Hansen and Daniel Quanz
Niklas Buscher and Jan Hendrick
Quentin Santos
Amund Desmarais and Rayan Safieddine
Carl Löndahl
Encryption
McEliece :
java code
sage
magma
QC-MDPC
QC-MDPC in python
HyMES :
c code
Niederreiter :
binary case
q-ary case
java code
Identification
Stern, Véron, CVE :
c code and java code|
Signature
CFS :
java code|
KKS :
c code
java code (report)
with additional properties
c code
Hash function/stream-cipher
FSB :
c code|java code
SFSB , SYND, 2SC :
c code and java code
RFSB :
c code and java code
FPGA VHDL source code
XSYND :
c code
-
CWE function
1er mai 2017, par Cayrel,
Philippe Niles
The implementation and study of two different constant weight encoding function.
-
Implementation of Goppa codes decoding algorithms in C
27 juillet 2014, par Amund Desmarais and Rayan Safieddine,
Cayrel
Implementation of Patterson, Berlekamp-Massey and Extended Euclidean in C.
-
Efficient Software Implementations of Code-based Hash Functions and Stream-Ciphers
27 août 2012, par Quentin Santos
New implementations of FSB, SFSB, RFSB, SYND, 2SC and XSYND have been done during an internship Mr. Cayrel tutored. Here are the source code, the intermediate values and an HTML5 presentation of RFSB.
-
An improved threshold ring signature scheme based on error correcting codes
3 avril 2012, par Cayrel,
Gerhard Hoffman
Here are some informations about the experimental results of our paper An improved threshold ring signature scheme based on error correcting codes
-
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
5 March 2012, by Cayrel,
Gerhard Hoffman
This document will outline the details for the source codes of the above
publication. It is our hope that it might help people interested in code-based cryptography to put this subject further by another step.
-
Implementation of the Hybrid McEliece Encryption Scheme (HyMES)
31 août 2011, par Niklas Buscher and Jan Hendrick
A description of the Hybrid McEliece Encryption Scheme (HyMES) with focus on the encoding of constant weight words.
-
Implementation of signature schemes with additional properties
31 août 2011, par Julian Oleg Arenz and Sarah Magin
Implementations in C and Java of and identity-based identification scheme and a t-out-of-N threshold ring signature scheme based on coding theory.
-
Implementation of code-based hash-functions and stream-ciphers
20 April 2011, by Cayrel,
Matthias Boll and Thorsten Peter
These are the results of a cryptography lab project of Thorsten
Peter and Matthias Boll in winter semester 2010/2011. The lab project contains two main parts: the implementation (C and Java) and performance comparison of several code-based cryptographic schemes.
-
Implementation of code-based zero-knowledge identification schemes
19 April 2011, by Cayrel,
Felix Günther and Holger Rother,
Gerhard Hoffman
In the context of the Cryptography Lab in the winter term 2010/2011, our task was to implement three different code-based zero-knowledge identification schemes, namely the ones proposed by Stern in 1993, Véron in 1996, and Cayrel, Véron, and El Yousfi in 2010.
We implemented these three schemes in C and Java.
This article gives a brief overview over the implementation including some timing results; a detailed report of our work as well as the complete source code are attached.