forked from Argyle-Software/dilithium
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCargo.toml
53 lines (43 loc) · 1.54 KB
/
Cargo.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
[package]
name = "pqc_dilithium"
version = "0.2.0"
authors = ["Mitchell Berry <[email protected]>"]
description = "A post-quantum cryptographic signature scheme based on the hardness of lattice problems over module lattices"
edition = "2018"
categories = ["cryptography"]
keywords = ["signature", "post-quantum", "signing"]
repository = "https://github.com/Argyle-Software/dilithium/"
license = "MIT OR Apache-2.0"
exclude = ["tests/KAT"]
rust-version = "1.50"
[dependencies]
rand_core = { version = "0.6.4", default-features = false }
getrandom = { version = "0.2.10", features = ["js"], optional = true }
wasm-bindgen = { version = "0.2.87", optional = true }
[dependencies.rand]
version = "0.8.5"
features = ["getrandom"]
[dev-dependencies]
pqc_core = { version = "0.3.0", features = ["load"] }
[target.'cfg(bench)'.dev-dependencies]
criterion = "0.4.0"
[[bench]]
name = "api"
harness = false
[features]
# By default this library uses mode3, also called Dilithium3
mode2 = []
mode3 = []
mode5 = []
# Enables AES mode which uses AES-256 in counter mode instead of SHAKE
aes = []
# Produces a random signature everytime when signing the same message.
# One may want to consider randomized signatures in situations where the side channel
# attacks exploiting determinism are applicable. Another situation
# where one may want to avoid determinism is when the signer does not wish to reveal the
# message that is being signed.
random_signing = []
# For compiling to wasm targets
wasm = ["wasm-bindgen", "getrandom/js"]
[lib]
crate-type = ["cdylib", "rlib"]