An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
-
Updated
May 7, 2022 - Python
An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
Post-quantum cryptographic obfuscation on PG(11,4). 7 neurotoxic defense layers. 287-bit security. 19 attacks defended. Gap 0.0008. Pure Python. The attacker sees everything — and can do nothing.
🐺 Post-quantum adaptive-behavioral oracle on PG(11,4). Beast 6: 8 Mordidas + Blood Eagle + Viking Frost + Aikido. The wolf watches, learns, bites. 3/3 GO — Gemini 9.8 · ChatGPT 9.3 · Grok 9.7. Pure Python 3, 0.136ms/query, zero deps. BSL 1.1 + Fenrir Clause.
Post-quantum cryptographic primitive that hides information by dissolving it into projective geometry. 5.5M points. 74% corruption. Perfect entropy. 10/10 attacks defended. 3.4 seconds. Zero dependencies. The attacker sees everything and recovers nothing.
Post-quantum cryptographic resource-drain oracle on PG(11,4). 12 Desiccation Layers + Epoch Chain. The desert is alive. The desert is thirsty. Pure Python 3, zero deps, 3.0s.
👁️ Post-quantum sovereignty oracle on PG(11,4). Beast 7: 8 Perversiones + Knuth semifield (2,016 non-associative violations) + Ghost Code + Moloch Token. She IS a black hole — 5 algebraic constants from GR. Friend 500/500 | gap=0.035 | δ=61.2%. Pure Python 3, zero deps. BSL 1.1 + Lilith Clause.
Post-quantum adaptive streaming oracle on PG(11,4). 7 Hells of cryptographic gaslight. 287-bit security. 2.3s pure Python. The attacker solves, validates, publishes — and is wrong.
Add a description, image, and links to the code-based-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the code-based-cryptography topic, visit your repo's landing page and select "manage topics."