Releases: LoupVaillant/Monocypher
Releases · LoupVaillant/Monocypher
Monocypher 3.1.0-RC2
Changes since 3.0.0:
- Added Elligator 2 mappings (hash to curve, curve to hash).
- Added OPRF support (with scalar inversion).
- Added Edwards25519 -> Curve25519 conversions
Monocypher 3.1.0-RC1
Changes since 3.0.0:
- Added Elligator 2 mappings (hash to curve, curve to hash).
- Added OPRF support (with scalar inversion).
- Added Edwards25519 -> Curve25519 conversions
Monocypher 3.0.0
Changes since 2.0.6:
- Deprecated the incremental AEAD interface.
- Deprecated the incremental Chacha20, added a direct interface.
- Added IETF Chacha20 (96-bit nonce), as described in RFC 8439.
- Moved deprecated interfaces to a separate
src/deprecated
folder. - Removed the
ED25519_SHA512
preprocessor flag. crypto_x25519()
andcrypto_key_exchange()
now returnvoid
.- Added a custom hash interface to EdDSA. Several instances of EdDSA
can share the same binary. - Added optional support for HMAC SHA-512
- Moved all SHA-512 operations to
src/optional/monocypher-ed25519.(h|c)
- Optional support for Ed25519 no longer requires a preprocessor flag.
Addsrc/optional/monocypher-ed25519.(h|c)
to your project instead.
Monocypher 3.0.0-RC2
Changes since 2.0.6
- Deprecated the incremental AEAD interface.
- Deprecated the incremental Chacha20, added a direct interface.
- Moved deprecated interfaces to a separate
src/deprecated
folder. - Removed the
ED25519_SHA512
preprocessor flag. crypto_x25519()
andcrypto_key_exchange()
now returnvoid
.- Added a custom hash interface to EdDSA. Several instances of EdDSA
can share the same binary. - Added optional support for HMAC SHA-512
- Moved all SHA-512 operations to
src/optional/monocypher-ed25519.(h|c)
- Optional support for Ed25519 no longer requires a preprocessor flag.
Addsrc/optional/monocypher-ed25519.(h|c)
to your project instead.
Monocypher 3.0.0-RC1
Release candidate for the next version of Monocypher.
- Deprecated the incremental AEAD interface.
- Deprecated the incremental Chacha20, added a direct interface.
- Moved deprecated interfaces to a separate
src/deprecated
folder. - Removed the
ED25519_SHA512
preprocessor flag. crypto_x25519()
andcrypto_key_exchange()
now returnvoid
.- Added a custom hash interface to EdDSA. Several instances of EdDSA
can share the same binary. - Added optional support for HMAC SHA-512
- Moved all SHA-512 operations to
src/optional/monocypher-ed25519.(h|c)
- Optional support for Ed25519 no longer requires a preprocessor flag.
Addsrc/optional/monocypher-ed25519.(h|c)
to your project instead.
Monocypher 2.0.6
Changes since 2.0.5
- Added the
BLAKE2_NO_UNROLLING
preprocessor definition. Activating it
makes the binary about 5KB smaller, and speeds up processing times on
many embedded processors. - Reduced the stack usage of signature verification by about
40%. Signature verification now fits in smaller machines. - Fixed many implicit casts warnings.
- Fixed the manual here and there.
- Lots of small nitpicks.
Monocypher 2.0.5
Changes since 2.0.4:
- Faster EdDSA signatures and verification. Like, 4 times as fast.
Monocypher 2.0.4
Changes since 2.0.3:
- Corrected a critical vulnerability in EdDSA, where crypto_check() was accepting invalid signatures. (Found by Mike Pechkin.) The current fix removes a buggy optimisation, effectively halving the performance of EdDSA.
- The test suite no longer tries to allocate zero bytes (some platforms fail such an allocation).
Monocypher 1.1.1
Changes since 1.1.0:
- Corrected a critical vulnerability in EdDSA, where crypto_check() was accepting invalid signatures. (Found by Mike Pechkin.) The current fix removes a buggy optimisation, effectively halving the performance of EdDSA.
- The test suite no longer tries to allocate zero bytes (some platforms fail such an allocation).
Monocypher 2.0.3
Changes since 2.0.2:
- Corrected undefined behaviour in Blake2b
- Improved the test suite (faster, better coverage)