Implementations in C and Java of and identity-based identification scheme and a t-out-of-N threshold ring signature scheme based on coding theory.
Articles les plus récents
-
Implementation of signature schemes with additional properties
31 août 2011, par Julian Oleg Arenz and Sarah Magin -
Implementation of code-based hash-functions and stream-ciphers
20 April 2011, by Cayrel, Matthias Boll and Thorsten PeterThese are the results of a cryptography lab project of Thorsten
Peter and Matthias Boll in winter semester 2010/2011. The lab project contains two main parts: the implementation (C and Java) and performance comparison of several code-based cryptographic schemes. -
Implementation of code-based zero-knowledge identification schemes
19 April 2011, by Cayrel, Felix Günther and Holger Rother, Gerhard HoffmanIn the context of the Cryptography Lab in the winter term 2010/2011, our task was to implement three different code-based zero-knowledge identification schemes, namely the ones proposed by Stern in 1993, Véron in 1996, and Cayrel, Véron, and El Yousfi in 2010.
We implemented these three schemes in C and Java.
This article gives a brief overview over the implementation including some timing results; a detailed report of our work as well as the complete source code are attached.
-
Keccak implementation on GPU
13 février 2011, par Cayrel Pierre-Louis, Gerhard HoffmanThis page is dedicated to the description of our GPU implementation of a cryptographic hash function family called Keccak, which is submited as a SHA-3 candidate.
-
Implementation on GPU of a provably secure lattice-based stream cipher
12 février 2011, par Cayrel Pierre-Louis, Rosemberg SilvaIn this paper we construct a lattice-based stream cipher using the provable secure
hardness of the Short Integer Solution (SIS) problem as security basis -
Code-based cryptography : community
7 septembre 2009, par CayrelHere is the list of the people working on code-based cryptography (they have at list one paper in this topic)
Feel free to contact me if someone is missing or if a link is dead.
-
Students : Bachelor - Master - PhD
1er septembre 2009, par CayrelHere is the list of the students I have supervised with their reports.
-
Talks
11 décembre 2008, par Cayrel Pierre-LouisListe des exposés invités dans des séminaires, groupes de travail et conférences internationales et nationales
-
McEliece in magma
25 novembre 2007, par Cayrelfrom this pdf.
Introduction
Magma also contains coding theory functions, including : Construction of general cyclic codes Construction of standard linear, cyclic, and alternant codes Combining codes : sum, intersection, (external) direct sum, Plotkin sum, concatenation Modifying a code : augment, extend, expurgate, lengthen, puncture, shorten, etc Changing the alphabet : extend field, restrict field, subfield subcode, trace code Construction of basic codes : Hamming, Reed-Muller, (...)