Implementation of the fastest ISD algorithms
-
Updated
Feb 21, 2025 - C++
Implementation of the fastest ISD algorithms
An implementation of Dumer's algorithm for Information Set Decoding.
An implementation of a few QC-MDPC decoding algorithms.
Post-quantum cryptographic implementation of HQC (Hamming Quasi-Cyclic) - a NIST PQC candidate for quantum-resistant key encapsulation using code-based cryptography
Circuital implementation of a Quantum Random Walk on a Johnson graph using qiskit
Markovian modeling of a QC-MDPC decoding algorithm.
An implementation of the Backflip QC-MDPC decoder.
Markovian modeling of a QC-MDPC decoding algorithm that accounts for near codewords.
Achieving security against fuzzing and improving bandwidth efficiency by combining FEC and symmetric encryption.
Scripts showing vulnerabilities in enhanced pqsigRM.
An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
Post-quantum cryptographic primitive that hides information by dissolving it into projective geometry. 5.5M points. 74% corruption. Perfect entropy. 10/10 attacks defended. 3.4 seconds. Zero dependencies. The attacker sees everything and recovers nothing.
Post-quantum cryptographic obfuscation on PG(11,4). 7 neurotoxic defense layers. 287-bit security. 19 attacks defended. Gap 0.0008. Pure Python. The attacker sees everything — and can do nothing.
An rough implementation of Sieving-Style ISD
🐺 Post-quantum adaptive-behavioral oracle on PG(11,4). Beast 6: 8 Mordidas + Blood Eagle + Viking Frost + Aikido. The wolf watches, learns, bites. 3/3 GO — Gemini 9.8 · ChatGPT 9.3 · Grok 9.7. Pure Python 3, 0.136ms/query, zero deps. BSL 1.1 + Fenrir Clause.
Post-quantum cryptographic resource-drain oracle on PG(11,4). 12 Desiccation Layers + Epoch Chain. The desert is alive. The desert is thirsty. Pure Python 3, zero deps, 3.0s.
Post-quantum adaptive streaming oracle on PG(11,4). 7 Hells of cryptographic gaslight. 287-bit security. 2.3s pure Python. The attacker solves, validates, publishes — and is wrong.
Add a description, image, and links to the code-based-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the code-based-cryptography topic, visit your repo's landing page and select "manage topics."