The implementation and study of two different constant weight encoding function.
Accueil > Research > Code-based cryptography > Code-based cryptosystems : implementations

Code-based cryptosystems : implementations
Dernier ajout : 28 septembre 2016.
You can find here some links to implementations of several code-based cryptosystems.
Thanks to :
CBCrypto
Ruhr-Universität Bochum
Eric Arnoult
Daniel Demmler and David Meier
Gerhard Hoffman
Lucas Rothamel and Manuel Weiel
Julian Oleg Arenz and Sarah Magin
Marius Hansen and Daniel Quanz
Niklas Buscher and Jan Hendrick
Quentin Santos
Amund Desmarais and Rayan Safieddine
Carl Löndahl
Encryption
McEliece :
java code | sage | magma | QC-MDPC | QC-MDPC in python |
HyMES :
c code |
binary case | q-ary case | java code |
Identification
c code and java code |
Signature
CFS :
java code |
KKS :
c code | java code (report) |
with additional properties
c code |
Hash function/stream-cipher
c code | java code |
c code and java code |
RFSB :
c code and java code | FPGA VHDL source code |
XSYND :
c code |
Articles de cette rubrique
CWE function
1er mai 2017, par ,Implementation of Goppa codes decoding algorithms in C
27 juillet 2014, par ,Implementation of Patterson, Berlekamp-Massey and Extended Euclidean in C.
Efficient Software Implementations of Code-based Hash Functions and Stream-Ciphers
27 août 2012, parNew implementations of FSB, SFSB, RFSB, SYND, 2SC and XSYND have been done during an internship Mr. Cayrel tutored. Here are the source code, the intermediate values and an HTML5 presentation of RFSB.
An improved threshold ring signature scheme based on error correcting codes
3 avril 2012, par ,Here are some informations about the experimental results of our paper An improved threshold ring signature scheme based on error correcting codes
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
5 March 2012, by ,This document will outline the details for the source codes of the above
publication. It is our hope that it might help people interested in code-based cryptography to put this subject further by another step.
0 | 5