-
Notifications
You must be signed in to change notification settings - Fork 7
Issues: GaloisInc/cryptol-specs
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Update type-check CI to include literate specs
CI
good first issue
Good for newcomers
#168
opened Oct 31, 2024 by
mccleeary-galois
1 of 5 tasks
Properties only working on particular Z3 versions
bug
Something isn't working
good first issue
Good for newcomers
#166
opened Oct 31, 2024 by
mccleeary-galois
2 of 6 tasks
Possibly incorrect definition of Something isn't working
gostCorrect64
bug
#164
opened Oct 31, 2024 by
RyanGlScott
Implement WOTS+ signature scheme
CNSA 2.0
new-spec
Addresses an algorithm that doesn't currently exist
#162
opened Oct 24, 2024 by
marsella
4 of 9 tasks
Put all the HMACs in the same place
improvement
Addresses fixes or changes to existing specs
#157
opened Oct 17, 2024 by
marsella
Deprecate old specs and update SHA3 API
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
#152
opened Oct 8, 2024 by
marsella
3 tasks
Add input validation functions and docs to ML-KEM
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
#149
opened Oct 3, 2024 by
marsella
7 tasks
Bring NTT sections of ML-KEM up to gold standard
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
#147
opened Oct 3, 2024 by
marsella
8 of 10 tasks
Abstract the sponge construction used in SHA3
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
#140
opened Sep 17, 2024 by
marsella
3 tasks
Expand ECDH test vectors
improvement
Addresses fixes or changes to existing specs
Suite-B
#136
opened Sep 5, 2024 by
marsella
2 tasks
Bring ML-KEM up to our gold standard
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
version-update
Addresses a new version of an existing spec
#135
opened Sep 5, 2024 by
marsella
5 of 9 tasks
Convert SHA-2 to be a literate spec
CNSA 2.0
literate
Addresses making an existing spec literate
Suite-B
#134
opened Aug 30, 2024 by
marsella
3 tasks
Consider adding more SHA2 test vectors
good first issue
Good for newcomers
improvement
Addresses fixes or changes to existing specs
Suite-B
#130
opened Aug 29, 2024 by
marsella
4 tasks
Add more NIST test vectors for AES
CNSA 2.0
good first issue
Good for newcomers
#129
opened Aug 29, 2024 by
marsella
4 tasks
Add check-docstrings to CI
CI
enhancement
New feature or request
#128
opened Aug 29, 2024 by
marsella
2 tasks
Replace uses of imperative SHA2 with spec-adherent SHA2
CNSA 2.0
improvement
Addresses fixes or changes to existing specs
#122
opened Aug 23, 2024 by
marsella
3 tasks
Update CI to target Nightly and Latest Release of Cryptol
CI
good first issue
Good for newcomers
#118
opened Aug 20, 2024 by
mccleeary-galois
Extend SHA2 implementation to support generic-length truncation
improvement
Addresses fixes or changes to existing specs
Suite-B
#111
opened Aug 7, 2024 by
marsella
3 tasks
Add more valid ECDSA test vectors
good first issue
Good for newcomers
improvement
Addresses fixes or changes to existing specs
Suite-B
#104
opened Aug 1, 2024 by
marsella
3 tasks
Add prime constraint to inverse function
core-utilities
good first issue
Good for newcomers
improvement
Addresses fixes or changes to existing specs
#100
opened Jul 30, 2024 by
marsella
3 tasks
Add a Hash interface
core-utilities
good first issue
Good for newcomers
new-spec
Addresses an algorithm that doesn't currently exist
#98
opened Jul 26, 2024 by
marsella
5 tasks
Convert AES to a literate spec
CNSA 2.0
literate
Addresses making an existing spec literate
#91
opened Jul 15, 2024 by
marsella
3 tasks
Convert GCM mode to a Literate spec
CNSA 2.0
literate
Addresses making an existing spec literate
#87
opened Jul 5, 2024 by
marsella
3 tasks
Previous Next
ProTip!
Follow long discussions with comments:>50.