You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
Michael Hamburg 4de70b837c separate out strobe and spongerng from shake. strobe is experimental. spongerng is experimental internally but the interface should be pretty good (except for any camelCase vs snake_case issues). shake should be stable 8 years ago
aux switch from xy positive to 1/xy positive; this is because it can make laddered direct_scalarmul almost sane. almost. 9 years ago
src separate out strobe and spongerng from shake. strobe is experimental. spongerng is experimental internally but the interface should be pretty good (except for any camelCase vs snake_case issues). shake should be stable 8 years ago
test separate out strobe and spongerng from shake. strobe is experimental. spongerng is experimental internally but the interface should be pretty good (except for any camelCase vs snake_case issues). shake should be stable 8 years ago
Doxyfile Separate .h files for SHA/SHAKE, STROBE and sponge RNG. TODO: .hxx. Also add a lot of docs 8 years ago
HISTORY.txt update HISTORY and TODO 8 years ago
LICENSE.txt Just the text files, until I get Legal approval to push the button 10 years ago
Makefile some more ct tests; serializeInto -> serialize_into. still need more ct tests, unification of snake vs camel case 8 years ago
README.txt tidy up 9 years ago
TODO.txt update HISTORY and TODO 8 years ago

README.txt

Ed448-Goldilocks, Decaf version.

This software is an experimental implementation of a new 448-bit elliptic
curve called Ed448-Goldilocks, with "Decaf" cofactor removal.

The source files here are all by Mike Hamburg. Most of them are (c)
2014-2015 Cryptography Research, Inc (a division of Rambus). All of these
files are usable under the MIT license contained in LICENSE.txt.

The Makefile is set for my 2013 MacBook Air. You can `make bench` to run
a completely arbitrary set of benchmarks and tests, or `make lib` to build
a stripped-down version of the library. For non-Haswell platforms, you may
need to replace -mavx2 -mbmi2 by an appropriate vector declaration.

I've attempted to protect against timing attacks and invalid point attacks,
but as of yet no attempt to protect against power analysis.

This software is incomplete, and lacks documentation. None of the APIs are
yet stable, though they may be getting there. The software is probably not
secure. Please consult TODO.txt for additional agenda items. Do not taunt
happy fun ball.

Cheers,
-- Mike Hamburg