Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ML-DSA / FIPS 204 final #1919

Merged
merged 52 commits into from
Nov 26, 2024
Merged
Show file tree
Hide file tree
Changes from 48 commits
Commits
Show all changes
52 commits
Select commit Hold shift + click to select a range
64cfbc9
Pull ML-DSA from upstream.
bhess Sep 10, 2024
3d18432
cleanup
bhess Sep 11, 2024
466d6bb
44 acvp working
bhess Oct 17, 2024
5580194
new pull & acvp tests for all parameters
bhess Oct 22, 2024
4d044c2
avx2 update
bhess Oct 22, 2024
2adea30
avx2 update
bhess Oct 22, 2024
b8df84e
avx2 update
bhess Oct 22, 2024
23b3fab
update
bhess Oct 22, 2024
4b86112
update avx2
bhess Oct 22, 2024
5ffca11
update avx2
bhess Oct 22, 2024
e779151
pull upstream master
bhess Nov 4, 2024
7482a36
fit ctx APIs
bhess Nov 4, 2024
cda12f2
code formatting
bhess Nov 4, 2024
692e009
code formatting
bhess Nov 4, 2024
5e86aa4
Adding _with_ctx_str APIs, templating
bhess Nov 4, 2024
a0255e4
fix doxygen
bhess Nov 4, 2024
896064a
fix template
bhess Nov 4, 2024
2e84173
fix memory leak in verify
bhess Nov 4, 2024
c9b246b
ifdefs for internal test apis [full tests]
bhess Nov 4, 2024
a2f6790
export symbols for acvp tests (dynamic linking), test improvements [f…
bhess Nov 5, 2024
51c0946
fix alg info check
bhess Nov 5, 2024
b16c35b
more portable assembly [full tests]
bhess Nov 5, 2024
b215c77
fix warnings [full tests]
bhess Nov 5, 2024
bc8e3ba
fix warnings [full tests]
bhess Nov 5, 2024
69a80f8
rebase & fix
bhess Nov 5, 2024
817fb7d
fix after rebase
bhess Nov 5, 2024
444bccf
fix sanitizer results [full tests]
bhess Nov 5, 2024
f4ad674
remove IPD intermediate values
bhess Nov 7, 2024
f9fa025
adds flag for ctx support & adds tests with ctx string
bhess Nov 7, 2024
10b0d98
dummy implementations for sigs without ctx supports, instead of null …
bhess Nov 7, 2024
a1789b8
Update constant-time passes after linenumer and function name changes…
bhess Nov 13, 2024
f77f2d4
Update KATs [extended tests] [trigger downstream]
bhess Nov 13, 2024
3d104e3
API with checks for signatures without ctx support
bhess Nov 14, 2024
1b86943
remove old patch files [extended tests] [trigger downstream]
bhess Nov 15, 2024
5f131f4
Update tests/test_sig.c
bhess Nov 18, 2024
6e7f829
Update tests/test_sig.c
bhess Nov 18, 2024
3da81fa
Update tests/vectors_sig.c
bhess Nov 18, 2024
2fc7279
Update tests/test_sig.c
bhess Nov 18, 2024
8792e26
Update tests/vectors_sig.c
bhess Nov 18, 2024
7d74795
Update tests/vectors_sig.c
bhess Nov 18, 2024
26236d9
Update tests/vectors_sig.c
bhess Nov 18, 2024
71bbf60
Update tests/vectors_sig.c
bhess Nov 18, 2024
59956a3
Update tests/vectors_sig.c
bhess Nov 18, 2024
daef659
Update tests/vectors_sig.c
bhess Nov 18, 2024
5cb2da5
Update tests/vectors_sig.c
bhess Nov 18, 2024
ed194b7
Updates after Spencer's review. Run astyle. [full tests]
bhess Nov 18, 2024
fe28f6b
Fix strict warnings [full tests]
bhess Nov 18, 2024
b06e5ec
More astyle [full tests]
bhess Nov 18, 2024
3e6302a
Change alg_version to FIPS204 [full tests]
bhess Nov 19, 2024
a47a23a
Update ml-dsa security claim to SUF-CMA [skip ci]
bhess Nov 19, 2024
a8731d2
Update src/sig/sig.h
bhess Nov 19, 2024
8420ebd
Fix test_alg_info [full tests]
bhess Nov 19, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 0 additions & 6 deletions .CMake/alg_support.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -137,11 +137,8 @@ cmake_dependent_option(OQS_ENABLE_SIG_dilithium_3 "" ON "OQS_ENABLE_SIG_DILITHIU
cmake_dependent_option(OQS_ENABLE_SIG_dilithium_5 "" ON "OQS_ENABLE_SIG_DILITHIUM" OFF)

option(OQS_ENABLE_SIG_ML_DSA "Enable ml_dsa algorithm family" ON)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_44_ipd "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_44 "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_65_ipd "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_65 "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_87_ipd "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_87 "" ON "OQS_ENABLE_SIG_ML_DSA" OFF)

option(OQS_ENABLE_SIG_FALCON "Enable falcon algorithm family" ON)
Expand Down Expand Up @@ -393,21 +390,18 @@ endif()

if(CMAKE_SYSTEM_NAME MATCHES "Darwin|Linux")
if(OQS_DIST_X86_64_BUILD OR (OQS_USE_AVX2_INSTRUCTIONS AND OQS_USE_POPCNT_INSTRUCTIONS))
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_44_ipd_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_44_ipd" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_44_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_44" OFF)
endif()
endif()

if(CMAKE_SYSTEM_NAME MATCHES "Darwin|Linux")
if(OQS_DIST_X86_64_BUILD OR (OQS_USE_AVX2_INSTRUCTIONS AND OQS_USE_POPCNT_INSTRUCTIONS))
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_65_ipd_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_65_ipd" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_65_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_65" OFF)
endif()
endif()

if(CMAKE_SYSTEM_NAME MATCHES "Darwin|Linux")
if(OQS_DIST_X86_64_BUILD OR (OQS_USE_AVX2_INSTRUCTIONS AND OQS_USE_POPCNT_INSTRUCTIONS))
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_87_ipd_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_87_ipd" OFF)
cmake_dependent_option(OQS_ENABLE_SIG_ml_dsa_87_avx2 "" ON "OQS_ENABLE_SIG_ml_dsa_87" OFF)
endif()
endif()
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/linux.yml
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ jobs:
path: build/*.deb
- name: Check STD algorithm and alias
if: matrix.name == 'jammy-std-openssl3'
run: 'tests/dump_alg_info | grep -zoP "ML-DSA-44:\n isnull: false" && tests/dump_alg_info | grep -zoP "ML-DSA-44-ipd:\n isnull: true" && tests/dump_alg_info | grep -zoP "ML-KEM-512:\n isnull: false"'
run: 'tests/dump_alg_info | grep -zoP "ML-DSA-44:\n isnull: false" && tests/dump_alg_info | grep -zoP "ML-KEM-512:\n isnull: false"'
working-directory: build

linux_arm_emulated:
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ Details on each supported algorithm can be found in the [docs/algorithms](https:

The list below indicates all algorithms currently supported by liboqs, including experimental algorithms and already excluding algorithm variants pruned during the NIST competition, such as Kyber-90s or Dilithium-AES.

The only algorithms in `liboqs` that implement NIST standards are the [`ML-KEM`](https://csrc.nist.gov/pubs/fips/203/final) (final standard) and [`ML-DSA`](https://csrc.nist.gov/pubs/fips/204/ipd) (initial public draft) variants with their respective different bit strengths. `liboqs` will retain these algorithm names selected by NIST throughout the finishing stages of the standardization process, so users can rely on their presence going forward. If NIST changes the implementation details of these algorithms, `liboqs` will adjust the implementation so that users are protected from such potential changes. For users interested in explicitly selecting the current "proposed draft standard" code, the variants with the suffix "-ipd" are made available. At this stage, "ml-dsa-ipd" and "ml-dsa" are functionally equivalent, denoted by the "alias" moniker below.
The only algorithms in `liboqs` that implement NIST standards are the [`ML-KEM`](https://csrc.nist.gov/pubs/fips/203/final) (final standard) and [`ML-DSA`](https://csrc.nist.gov/pubs/fips/204/final) (final standard) variants with their respective different bit strengths. `liboqs` will retain these algorithm names selected by NIST throughout the finishing stages of the standardization process, so users can rely on their presence going forward. If NIST changes the implementation details of these algorithms, `liboqs` will adjust the implementation so that users are protected from such potential changes.

Falcon and SPHINCS+ have also been [selected for standardization](https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022), but the `liboqs` implementations of these algorithms are currently tracking Round 3 submissions and not NIST standards drafts.

Expand All @@ -65,7 +65,7 @@ All names other than `ML-KEM` and `ML-DSA` are subject to change. `liboqs` makes
- **CRYSTALS-Dilithium**: Dilithium2, Dilithium3, Dilithium5
- **Falcon**: Falcon-512, Falcon-1024, Falcon-padded-512, Falcon-padded-1024
- **MAYO**: MAYO-1, MAYO-2, MAYO-3, MAYO-5†
- **ML-DSA**: ML-DSA-44-ipd (alias: ML-DSA-44), ML-DSA-65-ipd (alias: ML-DSA-65), ML-DSA-87-ipd (alias: ML-DSA-87)
- **ML-DSA**: ML-DSA-44, ML-DSA-65, ML-DSA-87
- **SPHINCS+-SHA2**: SPHINCS+-SHA2-128f-simple, SPHINCS+-SHA2-128s-simple, SPHINCS+-SHA2-192f-simple, SPHINCS+-SHA2-192s-simple, SPHINCS+-SHA2-256f-simple, SPHINCS+-SHA2-256s-simple
- **SPHINCS+-SHAKE**: SPHINCS+-SHAKE-128f-simple, SPHINCS+-SHAKE-128s-simple, SPHINCS+-SHAKE-192f-simple, SPHINCS+-SHAKE-192s-simple, SPHINCS+-SHAKE-256f-simple, SPHINCS+-SHAKE-256s-simple
<!--- OQS_TEMPLATE_FRAGMENT_LIST_SIGS_END -->
Expand Down
18 changes: 9 additions & 9 deletions docs/algorithms/sig/ml_dsa.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,22 +4,22 @@
- **Main cryptographic assumption**: hardness of lattice problems over module lattices.
- **Principal submitters**: Vadim Lyubashevsky.
- **Auxiliary submitters**: Shi Bai, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Peter Schwabe, Gregor Seiler, Damien Stehlé.
- **Authors' website**: https://pq-crystals.org/dilithium/ and https://csrc.nist.gov/pubs/fips/204/ipd
- **Specification version**: ML-DSA-ipd.
- **Authors' website**: https://pq-crystals.org/dilithium/ and https://csrc.nist.gov/pubs/fips/204/final
- **Specification version**: ML-DSA.
- **Primary Source**<a name="primary-source"></a>:
- **Source**: https://github.com/pq-crystals/dilithium/commit/e7bed6258b9a3703ce78d4ec38021c86382ce31c with copy_from_upstream patches
- **Source**: https://github.com/pq-crystals/dilithium/commit/444cdcc84eb36b66fe27b3a2529ee48f6d8150c2 with copy_from_upstream patches
- **Implementation license (SPDX-Identifier)**: CC0-1.0 or Apache-2.0


## Parameter set summary

| Parameter set | Parameter set alias | Security model | Claimed NIST Level | Public key size (bytes) | Secret key size (bytes) | Signature size (bytes) |
|:---------------:|:----------------------|:-----------------|---------------------:|--------------------------:|--------------------------:|-------------------------:|
| ML-DSA-44-ipd | ML-DSA-44 | EUF-CMA | 2 | 1312 | 2560 | 2420 |
| ML-DSA-65-ipd | ML-DSA-65 | EUF-CMA | 3 | 1952 | 4032 | 3309 |
| ML-DSA-87-ipd | ML-DSA-87 | EUF-CMA | 5 | 2592 | 4896 | 4627 |
| ML-DSA-44 | NA | EUF-CMA | 2 | 1312 | 2560 | 2420 |
| ML-DSA-65 | NA | EUF-CMA | 3 | 1952 | 4032 | 3309 |
| ML-DSA-87 | NA | EUF-CMA | 5 | 2592 | 4896 | 4627 |

## ML-DSA-44-ipd implementation characteristics
## ML-DSA-44 implementation characteristics

| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage?‡ |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:----------------------|
Expand All @@ -30,7 +30,7 @@ Are implementations chosen based on runtime CPU feature detection? **Yes**.

‡For an explanation of what this denotes, consult the [Explanation of Terms](#explanation-of-terms) section at the end of this file.

## ML-DSA-65-ipd implementation characteristics
## ML-DSA-65 implementation characteristics

| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
Expand All @@ -39,7 +39,7 @@ Are implementations chosen based on runtime CPU feature detection? **Yes**.

Are implementations chosen based on runtime CPU feature detection? **Yes**.

## ML-DSA-87-ipd implementation characteristics
## ML-DSA-87 implementation characteristics

| Implementation source | Identifier in upstream | Supported architecture(s) | Supported operating system(s) | CPU extension(s) used | No branching-on-secrets claimed? | No branching-on-secrets checked by valgrind? | Large stack usage? |
|:---------------------------------:|:-------------------------|:----------------------------|:--------------------------------|:------------------------|:-----------------------------------|:-----------------------------------------------|:---------------------|
Expand Down
17 changes: 7 additions & 10 deletions docs/algorithms/sig/ml_dsa.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,16 +11,15 @@ auxiliary-submitters:
- Gregor Seiler
- Damien Stehlé
crypto-assumption: hardness of lattice problems over module lattices
website: https://pq-crystals.org/dilithium/ and https://csrc.nist.gov/pubs/fips/204/ipd
nist-round: ipd
spec-version: ML-DSA-ipd
website: https://pq-crystals.org/dilithium/ and https://csrc.nist.gov/pubs/fips/204/final
nist-round: FIPS204
spec-version: ML-DSA
primary-upstream:
source: https://github.com/pq-crystals/dilithium/commit/e7bed6258b9a3703ce78d4ec38021c86382ce31c
source: https://github.com/pq-crystals/dilithium/commit/444cdcc84eb36b66fe27b3a2529ee48f6d8150c2
with copy_from_upstream patches
spdx-license-identifier: CC0-1.0 or Apache-2.0
parameter-sets:
- name: ML-DSA-44-ipd
alias: ML-DSA-44
- name: ML-DSA-44
claimed-nist-level: 2
claimed-security: EUF-CMA
length-public-key: 1312
Expand Down Expand Up @@ -51,8 +50,7 @@ parameter-sets:
no-secret-dependent-branching-claimed: true
no-secret-dependent-branching-checked-by-valgrind: true
large-stack-usage: false
- name: ML-DSA-65-ipd
alias: ML-DSA-65
- name: ML-DSA-65
claimed-nist-level: 3
claimed-security: EUF-CMA
length-public-key: 1952
Expand Down Expand Up @@ -83,8 +81,7 @@ parameter-sets:
no-secret-dependent-branching-claimed: true
no-secret-dependent-branching-checked-by-valgrind: true
large-stack-usage: false
- name: ML-DSA-87-ipd
alias: ML-DSA-87
- name: ML-DSA-87
claimed-nist-level: 5
claimed-security: EUF-CMA
length-public-key: 2592
Expand Down
62 changes: 31 additions & 31 deletions docs/cbom.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,23 +2,23 @@
"$schema": "https://raw.githubusercontent.com/CycloneDX/specification/1.6/schema/bom-1.6.schema.json",
"bomFormat": "CycloneDX",
"specVersion": "1.6",
"serialNumber": "urn:uuid:679a1c2f-1dd4-4692-b098-1d4dacdfc75d",
"serialNumber": "urn:uuid:de1355bb-9681-4a7e-8aa9-0ccc414ebe3b",
"version": 1,
"metadata": {
"timestamp": "2024-10-01T14:21:06.857613+00:00",
"timestamp": "2024-11-05T12:25:53.012740+00:00",
"component": {
"type": "library",
"bom-ref": "pkg:github/open-quantum-safe/liboqs@bf7cbdca1bf2866da22b4b75e04b68baf6707a7b",
"bom-ref": "pkg:github/open-quantum-safe/liboqs@69a80f8a66988521d51e94d716cff8c936c07b8d",
"name": "liboqs",
"version": "bf7cbdca1bf2866da22b4b75e04b68baf6707a7b"
"version": "69a80f8a66988521d51e94d716cff8c936c07b8d"
}
},
"components": [
{
"type": "library",
"bom-ref": "pkg:github/open-quantum-safe/liboqs@bf7cbdca1bf2866da22b4b75e04b68baf6707a7b",
"bom-ref": "pkg:github/open-quantum-safe/liboqs@69a80f8a66988521d51e94d716cff8c936c07b8d",
"name": "liboqs",
"version": "bf7cbdca1bf2866da22b4b75e04b68baf6707a7b"
"version": "69a80f8a66988521d51e94d716cff8c936c07b8d"
},
{
"type": "cryptographic-asset",
Expand Down Expand Up @@ -2502,12 +2502,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-44-ipd:generic",
"bom-ref": "alg:ML-DSA-44:generic",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-44-ipd",
"parameterSetIdentifier": "ML-DSA-44",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand All @@ -2522,12 +2522,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-44-ipd:x86_64",
"bom-ref": "alg:ML-DSA-44:x86_64",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-44-ipd",
"parameterSetIdentifier": "ML-DSA-44",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand All @@ -2542,12 +2542,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-65-ipd:generic",
"bom-ref": "alg:ML-DSA-65:generic",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-65-ipd",
"parameterSetIdentifier": "ML-DSA-65",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand All @@ -2562,12 +2562,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-65-ipd:x86_64",
"bom-ref": "alg:ML-DSA-65:x86_64",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-65-ipd",
"parameterSetIdentifier": "ML-DSA-65",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand All @@ -2582,12 +2582,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-87-ipd:generic",
"bom-ref": "alg:ML-DSA-87:generic",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-87-ipd",
"parameterSetIdentifier": "ML-DSA-87",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand All @@ -2602,12 +2602,12 @@
},
{
"type": "cryptographic-asset",
"bom-ref": "alg:ML-DSA-87-ipd:x86_64",
"bom-ref": "alg:ML-DSA-87:x86_64",
"name": "ML-DSA",
"cryptoProperties": {
"assetType": "algorithm",
"algorithmProperties": {
"parameterSetIdentifier": "ML-DSA-87-ipd",
"parameterSetIdentifier": "ML-DSA-87",
"primitive": "signature",
"executionEnvironment": "software-plain-ram",
"cryptoFunctions": [
Expand Down Expand Up @@ -3127,7 +3127,7 @@
],
"dependencies": [
{
"ref": "pkg:github/open-quantum-safe/liboqs@bf7cbdca1bf2866da22b4b75e04b68baf6707a7b",
"ref": "pkg:github/open-quantum-safe/liboqs@69a80f8a66988521d51e94d716cff8c936c07b8d",
"provides": [
"alg:BIKE-L1:x86_64",
"alg:BIKE-L3:x86_64",
Expand Down Expand Up @@ -3253,12 +3253,12 @@
"alg:MAYO-3:x86_64",
"alg:MAYO-5:generic",
"alg:MAYO-5:x86_64",
"alg:ML-DSA-44-ipd:generic",
"alg:ML-DSA-44-ipd:x86_64",
"alg:ML-DSA-65-ipd:generic",
"alg:ML-DSA-65-ipd:x86_64",
"alg:ML-DSA-87-ipd:generic",
"alg:ML-DSA-87-ipd:x86_64",
"alg:ML-DSA-44:generic",
"alg:ML-DSA-44:x86_64",
"alg:ML-DSA-65:generic",
"alg:ML-DSA-65:x86_64",
"alg:ML-DSA-87:generic",
"alg:ML-DSA-87:x86_64",
"alg:SPHINCS+-SHA2-128f-simple:generic",
"alg:SPHINCS+-SHA2-128f-simple:x86_64",
"alg:SPHINCS+-SHA2-128s-simple:generic",
Expand Down Expand Up @@ -4044,37 +4044,37 @@
]
},
{
"ref": "alg:ML-DSA-44-ipd:generic",
"ref": "alg:ML-DSA-44:generic",
"dependsOn": [
"alg:sha3"
]
},
{
"ref": "alg:ML-DSA-44-ipd:x86_64",
"ref": "alg:ML-DSA-44:x86_64",
"dependsOn": [
"alg:sha3"
]
},
{
"ref": "alg:ML-DSA-65-ipd:generic",
"ref": "alg:ML-DSA-65:generic",
"dependsOn": [
"alg:sha3"
]
},
{
"ref": "alg:ML-DSA-65-ipd:x86_64",
"ref": "alg:ML-DSA-65:x86_64",
"dependsOn": [
"alg:sha3"
]
},
{
"ref": "alg:ML-DSA-87-ipd:generic",
"ref": "alg:ML-DSA-87:generic",
"dependsOn": [
"alg:sha3"
]
},
{
"ref": "alg:ML-DSA-87-ipd:x86_64",
"ref": "alg:ML-DSA-87:x86_64",
"dependsOn": [
"alg:sha3"
]
Expand Down
Loading
Loading