TIMECOP
/ crypto_sign

Primitives for crypto_sign

This page lists all primitives grouped under operation crypto_sign.

For each primitive, all listed implementations were checked across a number of compilers, compiler options, and hosts.

The progress bar shows the relative number of successes, fails, and errors:

  • Success. The constant-time checker didn't find any cases where the execution time of the tested code depends on secret data.
  • Fail. The execution time of the tested code depends on secret data.
  • Error.

Errors can have multiple causes:
  • The constant-time checker encountered an error and couldn't be completed.
  • Valgrind found memory issues, but none of them are related to constant-time checks.
  • The constant-time checker timed out after 6 minutes.
  • The tested code produced invalid results. More details can be found near the start of the output file. Example:
    crypto_aead_decrypt returns nonzero 

The absolute number of successes, fails, and errors is shown to the left of the progress bar.

The following code was used to flag secret data, and test implementations:

1void timecop_doit(void)
2{
3 poison(s, crypto_sign_SECRETKEYBYTES);
4 crypto_sign(c,&clen,m,mlen,s);
5 unpoison(p, crypto_sign_PUBLICKEYBYTES);
6 unpoison(c, clen);
7 crypto_sign_open(t,&tlen,c,clen,p);
8}

Click an implementation to see all checked compiler options.

3icp
Description
3-invertible cycle with minus and prefix
Designers
Jintai Ding
Christopher Wolf
Bo-Yin Yang
Implementations:
dilithium2
Implementations:
dilithium3
Implementations:
dilithium4
Implementations:
donald2048
Description
DSA signatures using a 2048-bit prime
Designers
Example for eBATS
Implementations:
ed25519
Description
EdDSA signatures using Curve25519
Designers
Daniel J. Bernstein
Niels Duif
Tanja Lange
Peter Schwabe
Bo-Yin Yang
Implementations:
ed448goldilocks
Description
Ed448-Goldilocks sign and dh
Designers
Mike Hamburg
Implementations:
edons128k08n72nu8l4mu3
Description
An alternative Edon-S signature scheme proposal in Category 2.
Conjectured security requires computational resources comparable to
or greater than those required for finding collisions in SHA256 - Category 2

Designers
Danilo Gligoroski
Implementations:
edons128ref
Description
Reference proposal for signature scheme Edon-S128.
Conjectured security requires computational resources comparable to
or greater than those required for finding collisions in SHA256 - Category 2
Designers
Danilo Gligoroski
Implementations:
hector
Description
Hyperelliptic Curve with Two-Rank One: Signatures using a genus-2 hyperelliptic curve of 2-rank 1 over a field of size 2^113
Designers
Peter Birkner (Technische Universiteit Eindhoven)
Peter Schwabe (Technische Universiteit Eindhoven)
Implementations:
luov8117404
Description
The LUOV signature scheme, with parameters for NIST security level 5.
Designers
Ward Beullens
Implementations:
luov863256
Description
The LUOV signature scheme, with parameters for NIST security level 2.
Designers
Ward Beullens
Implementations:
luov890351
Description
The LUOV signature scheme, with parameters for NIST security level 4.
Designers
Ward Beullens
Implementations:
mqdss48
Implementations:
mqdss64
Implementations:
mqqsig160
Description
mqqsig160 - 160-bit signatures based on Multivariate-Quadratic-Quasigroups
Designers
Danilo Gligoroski (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Steinsmo Ødegard (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Erlend Jensen (The Norwegian University of Science and Technology (NTNU), NORWAY)
Ludovic Perret (Pierre and Marie Curie University - Paris, FRANCE)
Jean-Charles Fauge`re (Pierre and Marie Curie University - Paris, FRANCE)
Svein Johan Knapskog (The Norwegian University of Science and Technology (NTNU), NORWAY)
Smile Markovski (Ss Cyril and Methodius University - Skopje, MAKEDONIJA)

Implementations:
mqqsig192
Description
mqqsig192 - 192-bit signatures based on Multivariate-Quadratic-Quasigroups
Designers
Danilo Gligoroski (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Steinsmo Ødegard (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Erlend Jensen (The Norwegian University of Science and Technology (NTNU), NORWAY)
Ludovic Perret (Pierre and Marie Curie University - Paris, FRANCE)
Jean-Charles Fauge`re (Pierre and Marie Curie University - Paris, FRANCE)
Svein Johan Knapskog (The Norwegian University of Science and Technology (NTNU), NORWAY)
Smile Markovski (Ss Cyril and Methodius University - Skopje, MAKEDONIJA)

Implementations:
mqqsig224
Description
mqqsig224 - 224-bit signatures based on Multivariate-Quadratic-Quasigroups
Designers
Danilo Gligoroski (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Steinsmo Ødegard (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Erlend Jensen (The Norwegian University of Science and Technology (NTNU), NORWAY)
Ludovic Perret (Pierre and Marie Curie University - Paris, FRANCE)
Jean-Charles Fauge`re (Pierre and Marie Curie University - Paris, FRANCE)
Svein Johan Knapskog (The Norwegian University of Science and Technology (NTNU), NORWAY)
Smile Markovski (Ss Cyril and Methodius University - Skopje, MAKEDONIJA)

Implementations:
mqqsig256
Description
mqqsig256 - 256-bit signatures based on Multivariate-Quadratic-Quasigroups
Designers
Danilo Gligoroski (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Steinsmo Ødegard (The Norwegian University of Science and Technology (NTNU), NORWAY)
Rune Erlend Jensen (The Norwegian University of Science and Technology (NTNU), NORWAY)
Ludovic Perret (Pierre and Marie Curie University - Paris, FRANCE)
Jean-Charles Fauge`re (Pierre and Marie Curie University - Paris, FRANCE)
Svein Johan Knapskog (The Norwegian University of Science and Technology (NTNU), NORWAY)
Smile Markovski (Ss Cyril and Methodius University - Skopje, MAKEDONIJA)

Implementations:
ntrumls401x
Description
Parameters N: 401, q: 2^18, p: 3. Estimated security: 112 bits
Designers
Jeff Hoffstein
Jill Pipher
John M. Schanck
Joseph H. Silverman
William Whyte
Implementations:
ntrumls439x
Description
Parameters N: 439, q: 2^19, p: 3. Estimated security: 128 bits
Designers
Jeff Hoffstein
Jill Pipher
John M. Schanck
Joseph H. Silverman
William Whyte
Implementations:
ntrumls593x
Description
Parameters N: 593, q: 2^19, p: 3. Estimated security: 192 bits
Designers
Jeff Hoffstein
Jill Pipher
John M. Schanck
Joseph H. Silverman
William Whyte
Implementations:
ntrumls743x
Description
Parameters N: 743, q: 2^20, p: 3. Estimated security: 256 bits
Designers
Jeff Hoffstein
Jill Pipher
John M. Schanck
Joseph H. Silverman
William Whyte
Implementations:
pflash1
Description
C*- with a prefix over GF16 designed to match SFLASH
Designers
Jintai Ding
Bo-Yin Yang
Implementations:
picnicl1fs
Description
Picnic-FS L1
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
picnicl1ur
Description
Picnic-UR L1
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
picnicl3fs
Description
Picnic-FS L3
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
picnicl3ur
Description
Picnic-UR L3
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
picnicl5fs
Description
Picnic-FS L5
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
picnicl5ur
Description
Picnic-UR L5
Designers
Melissa Chase (Microsoft Research)
David Derler (Graz University of Technology)
Steven Goldfeder (Princeton University)
Claudio Orlandi (Aarhus University)
Sebastian Ramacher (Graz University of Technology)
Christian Rechberger (Graz University of Technology)
Daniel Slamanig (AIT Austrian Institute of Technology)
Greg Zaverucha (Microsoft Research)
Implementations:
pqrsa15
Implementations:
qtesla1
Implementations:
qtesla128
Implementations:
qtesla192
Implementations:
qtesla1p
Implementations:
qtesla256
Implementations:
qtesla3f
Implementations:
qtesla3p
Implementations:
qtesla3s
Implementations:
rainbow
Description
Rainbow multivariate-quadratic signatures
Designers
Jintai Ding (University of Cincinnati)
Dieter Schmidt (University of Cincinnati)
Implementations:
rainbow5640
Description
Rainbow over GF31
(31,16,20,20)
Designers
Jintai Ding
Bo-Yin Yang
Implementations:
rainbow6440
Description
Rainbow over GF31
(31,26,20,20)
Designers
Jintai Ding
Bo-Yin Yang
Implementations:
rainbowbinary16242020
Description
Rainbow over GF16
(16,24,20,20)
Designers
Bo-Yin Yang
Implementations:
rainbowbinary256181212
Description
Rainbow over GF256
(256,18,12,12)
Designers
Bo-Yin Yang
Implementations:
rwb0fuz1024
Description
1024-bit Rabin-Williams signatures with compression
Designers
Adam Langley (Google)
Implementations:
sflashv2
Description
SFLASHv2 multivariate-quadratic signatures
Designers
Louis Goubin (Université de Versailles)
Nicolas Courtois (University College London)
Thomas Icart (École Polytechnique)
Implementations:
sphincs256
Designers
Daniel J. Bernstein1
Daira Hopwood
Andreas Hülsing
Tanja Lange
Ruben Niederhagen
Louiza Papachristodoulou
Peter Schwabe
Zooko Wilcox O'Hearn
Implementations:
tts6440
Description
Rainbow over GF16
Designers
Bo-Yin Yang
Implementations: