Implementation of the fastest ISD algorithms
-
Updated
Feb 21, 2025 - C++
Implementation of the fastest ISD algorithms
An implementation of Dumer's algorithm for Information Set Decoding.
An implementation of a few QC-MDPC decoding algorithms.
Post-quantum cryptographic implementation of HQC (Hamming Quasi-Cyclic) - a NIST PQC candidate for quantum-resistant key encapsulation using code-based cryptography
Circuital implementation of a Quantum Random Walk on a Johnson graph using qiskit
Markovian modeling of a QC-MDPC decoding algorithm.
An implementation of the Backflip QC-MDPC decoder.
Markovian modeling of a QC-MDPC decoding algorithm that accounts for near codewords.
Achieving security against fuzzing and improving bandwidth efficiency by combining FEC and symmetric encryption.
Scripts showing vulnerabilities in enhanced pqsigRM.
Post-quantum cryptographic obfuscation on PG(11,4). 7 neurotoxic defense layers. 287-bit security. 19 attacks defended. Gap 0.0008. Pure Python. The attacker sees everything — and can do nothing.
An rough implementation of Sieving-Style ISD
An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
🐺 Post-quantum adaptive-behavioral oracle on PG(11,4). Beast 6: 8 Mordidas + Blood Eagle + Viking Frost + Aikido. The wolf watches, learns, bites. 3/3 GO — Gemini 9.8 · ChatGPT 9.3 · Grok 9.7. Pure Python 3, 0.136ms/query, zero deps. BSL 1.1 + Fenrir Clause.
Post-quantum cryptographic primitive that hides information by dissolving it into projective geometry. 5.5M points. 74% corruption. Perfect entropy. 10/10 attacks defended. 3.4 seconds. Zero dependencies. The attacker sees everything and recovers nothing.
Post-quantum cryptographic resource-drain oracle on PG(11,4). 12 Desiccation Layers + Epoch Chain. The desert is alive. The desert is thirsty. Pure Python 3, zero deps, 3.0s.
Post-quantum adaptive streaming oracle on PG(11,4). 7 Hells of cryptographic gaslight. 287-bit security. 2.3s pure Python. The attacker solves, validates, publishes — and is wrong.
Add a description, image, and links to the code-based-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the code-based-cryptography topic, visit your repo's landing page and select "manage topics."