Implementations of well known attacks against the original McEliece cryptosystem with irreductible binary Goppa codes.
-
Updated
May 3, 2018 - Scala
Implementations of well known attacks against the original McEliece cryptosystem with irreductible binary Goppa codes.
A proof-of-concept implementation of the McEliece cryptosystem in Julia.
information-set decoding for binary codes
information-set decoding for code-based hash functions (see publication: https://eprint.iacr.org/2011/120)
information-set decoding for q-ary codes
LDPC-based McEliece cryptosystem
Instrumented implementations of modern-day KEXs and future KEMs
A proper cryptosystem that will enable us to access a passwords database securely.
Command line tool for Classic McEliece cryptography
The CEX Cryptographic library in C++
Проект по созданию криптосистемы Мак-Элиса
CROWNTITANIUM: an in-house made asymmetric supercipher encryption with post-quantum resistance
素体上の古典的Goppa符号をピーターソン復号したもの。
The McEliece cryptosystem using Hamming codes
Node.js bindings for the reference implementation of the Classic McEliece KEM.
Add a description, image, and links to the mceliece topic page so that developers can more easily learn about it.
To associate your repository with the mceliece topic, visit your repo's landing page and select "manage topics."