5ceb73367d- Updated to 0.14.0: * Key encapsulation mechanisms: - HQC: Disabled compiler optimizations to avoid secret-dependent branching in certain configurations. HQC remains disabled by default. - ML-KEM: Updated the default ML-KEM implementation to [PQCP's mlkem-native v1.0.0](https://github.com/pq-code-package/mlkem-native/releases/tag/v1.0.0). * Digital signature schemes: - New API: added an API function to check if a signature scheme supports signing with a context string. - SNOVA: added [SNOVA](https://snova.pqclab.org/) from NIST Additional Signature Schemes Round 2. * Other changes: - Added an AVX512VL-optimized backend for SHA3. - Improved memory management throughout the codebase. - CVE-2025-52473: Disabled compiler optimizations for HQC to avoid secret-dependent branches. Thank you to Zhenzhi Lai and Zhiyuan Zhang from from the University of Melbourne and the Max Planck Institute for Security and Privacy for identifying the issue. (bsc#1246301) - new major library version liboqs.so.8
devel
Marcus Meissner2025-07-10 19:46:26 +00:00
a3e5f9a874Accepting request 1288799 from devel:libraries:c_c++Ana Guerrero2025-06-27 21:00:21 +00:00
889dfda933Accepting request 1276795 from devel:libraries:c_c++Ana Guerrero2025-05-13 18:12:25 +00:00
8fc7632194- add -DOQS_ENABLE_KEM_HQC=ON even due to security issues, as otherwise we dropped binary compatibility with postquantumcryptoengine (bsc#1242701)Marcus Meissner2025-05-12 09:58:39 +00:00
4562a2f8eeAdd reproducible.patch to not embed the buildhost's kernel version (boo#1101107)Marcus Meissner2025-05-12 07:46:52 +00:00
96579755feAccepting request 1270599 from devel:libraries:c_c++Ana Guerrero2025-04-18 14:15:14 +00:00
850526d5b8- Updated to 0.13.0: - Key encapsulation mechanisms - New API: Added a deterministic key generation and API for KEMs (only ML-KEM supported at the moment). - ML-KEM: Changed the default ML-KEM implementation to [PQCP's mlkem-native](https://github.com/pq-code-package/mlkem-native). There are three variants: Portable C, AVX2, and AArch64. Large +parts of these implementations are formally verified: all of the C code is verified for memory and type safety using [CBMC](https://github.com/diffblue/cbmc) and the functional correctness +of the core AArch64 assembly routines is verified using [HOL-Light](https://github.com/jrh13/hol-light). - ML-KEM: Added support for the ML-KEM implementation from [Nvidia cuPQC](https://developer.nvidia.com/cupqc), a GPU accelerated cryptography library. - ML-KEM: Implementation from mlkem-native upstream updated to add Pair-wise Consistency Test (PCT) and Intel CET support. - ML-KEM: Improved testing of ML-KEM keys. - HQC: Disabled HQC by default until [a new security flaw](https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Wiu4ZQo3fP8) is fixed. - Digital signature schemes - ML-DSA: Improved testing for ML-DSA. - CROSS: Updated to NIST Additional Signatures Round 2 version. - MAYO: Updated to NIST Additional Signatures Round 2 version. - UOV: Added support for UOV algorithm from NIST Additional Signatures Round 2.Marcus Meissner2025-04-17 16:13:32 +00:00
18287f17a5Accepting request 1230161 from devel:libraries:c_c++Ana Guerrero2024-12-13 21:31:45 +00:00
7a3705cf7fAccepting request 1230160 from home:msmeissn:branches:devel:libraries:c_c++Marcus Meissner2024-12-11 16:00:31 +00:00
9451ee3c17Accepting request 1205214 from devel:libraries:c_c++Ana Guerrero2024-10-03 16:00:05 +00:00
da819a8241- Updated to 0.11.0: * This release updates ML-KEM implementations to their final FIPS 203 https://csrc.nist.gov/pubs/fips/203/final versions . * This release still includes the NIST Round 3 version of Kyber for interoperability purposes, but we plan to remove Kyber Round 3 in a future release. * Additionally, this release adds support for MAYO and CROSS digital signature schemes from [NIST Additional Signatures Round 1 https://csrc.nist.gov/Projects/pqc-dig-sig/round-1-additional-signatures along with stateful hash-based signature schemes XMSS https://datatracker.ietf.org/doc/html/rfc8391 and LMS https://datatracker.ietf.org/doc/html/rfc8554. * Finally, this release provides formally verified implementations of Kyber-512 and Kyber-768 from libjade https://github.com/formosa-crypto/libjade/releases/tag/release%2F2023.05-2 * LMS and XMSS are disabled by default due to the security risks associated with their use in software. See the note on stateful hash-based signatures in CONFIGURE.md * Key encapsulation mechanisms: - Kyber: Added formally-verified portable C and AVX2 implementations of Kyber-512 and Kyber-768 from libjade. - ML-KEM: Updated portable C and AVX2 implementations of ML-KEM-512, ML-KEM-768, and ML-KEM-1024 to FIP 203 version. - Kyber: Patched ARM64 implementations of Kyber-512, Kyber-768, and Kyber-1024 to work with AddressSanitizer. * Digital signature schemes: - LMS/XMSS: Added implementations of stateful hash-based signature schemes: XMSS and LMS - MAYO: Added portable C and AVX2 implementations of MAYO signature scheme from NIST Additional Signatures Round 1. - CROSS: Added portable C and AVX2 implementations of CROSS signatureMarcus Meissner2024-10-02 13:33:23 +00:00
710175eee3Accepting request 1179955 from devel:libraries:c_c++Ana Guerrero2024-06-11 16:31:14 +00:00
032a6809eeAccepting request 1179954 from home:msmeissn:branches:devel:libraries:c_c++Marcus Meissner2024-06-11 08:54:06 +00:00
1162eeaa64Accepting request 1160955 from devel:libraries:c_c++Ana Guerrero2024-03-25 20:08:57 +00:00
ab4a90148bAccepting request 1160954 from home:msmeissn:branches:devel:libraries:c_c++Marcus Meissner2024-03-23 13:45:52 +00:00
609491fffcAccepting request 1144526 from devel:libraries:c_c++Ana Guerrero2024-02-06 15:33:08 +00:00