swh:1:snp:1b6c5081a9a38b819ea21db1920b7de7ee4315a5
Raw File
Tip revision: 6340ad16593f49d7d2cea8830cb48ddd522c2d5e authored by Alessandro Barenghi on 06 September 2018, 09:50:43 UTC
fixed decoder and sparse multiplication, added forceful zeroize to buffer
Tip revision: 6340ad1
CHANGELOG
Version 1.0.2 (tag v1.0.2)

* Fixed decoding bug, unelicited by submission parameters.

* Fixed sparse multiplication bug, unelicited by submission parameters.

* Added forced zero filling for the memory area which subsequently holds 
  the data to be hashed whenever a decoding failure takes place.

----------------------------
Version 1.0.1 (tag v1.0.1)

* Added the secret key to the hash which generates the pseudorandom value
  for the encapsulated secret in case of decoding failure. This addresses 
  the official comment made by Keita Xagawa about the OW-CPA of the scheme.

* Added explicit count of the error vector weight. Decoding an error with
  a different weight from the expected one (t) always results in a decryption
  failure.
  Prevents trivial reaction attacks which forge messages with a number of errors
  (slightly) higher than the specification.

* Workaround for an apparent mistranslation of the code in the Clang/LLVM compilation
  toolchain of macOS Sierra 16.6.0, pointed out by Jacob Alperin-Sheriff.

----------------------------
Version 1.0 (tag v1.0)

* Original submission to NIST
back to top