This document will outline the details for the source codes of the above
publication. It is our hope that it might help people interested in code-based cryptography to put this subject further by another step.
Articles les plus récents
-
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
5 March 2012, by Cayrel, Gerhard Hoffman -
Biographie
20 September 2011, by CayrelMa biographie
-
Implementation of the Hybrid McEliece Encryption Scheme (HyMES)
31 août 2011, par Niklas Buscher and Jan HendrickA description of the Hybrid McEliece Encryption Scheme (HyMES) with focus on the encoding of constant weight words.
-
Implementation of signature schemes with additional properties
31 août 2011, par Julian Oleg Arenz and Sarah MaginImplementations in C and Java of and identity-based identification scheme and a t-out-of-N threshold ring signature scheme based on coding theory.
-
Implementation of code-based hash-functions and stream-ciphers
20 April 2011, by Cayrel, Matthias Boll and Thorsten PeterThese are the results of a cryptography lab project of Thorsten
Peter and Matthias Boll in winter semester 2010/2011. The lab project contains two main parts: the implementation (C and Java) and performance comparison of several code-based cryptographic schemes. -
Implementation of code-based zero-knowledge identification schemes
19 April 2011, by Cayrel, Felix Günther and Holger Rother, Gerhard HoffmanIn the context of the Cryptography Lab in the winter term 2010/2011, our task was to implement three different code-based zero-knowledge identification schemes, namely the ones proposed by Stern in 1993, Véron in 1996, and Cayrel, Véron, and El Yousfi in 2010.
We implemented these three schemes in C and Java.
This article gives a brief overview over the implementation including some timing results; a detailed report of our work as well as the complete source code are attached.
-
Keccak implementation on GPU
13 février 2011, par Cayrel Pierre-Louis, Gerhard HoffmanThis page is dedicated to the description of our GPU implementation of a cryptographic hash function family called Keccak, which is submited as a SHA-3 candidate.
-
Implementation on GPU of a provably secure lattice-based stream cipher
12 février 2011, par Cayrel Pierre-Louis, Rosemberg SilvaIn this paper we construct a lattice-based stream cipher using the provable secure
hardness of the Short Integer Solution (SIS) problem as security basis -
Code-based cryptography : community
7 septembre 2009, par CayrelHere is the list of the people working on code-based cryptography (they have at list one paper in this topic)
Feel free to contact me if someone is missing or if a link is dead.
-
Students : Bachelor - Master - PhD
1er septembre 2009, par CayrelHere is the list of the students I have supervised with their reports.