lol: A library for lattice cryptography.

[ crypto, gpl, library ] [ Propose Tags ]

Λ ○ λ (Lol) is a general-purpose library for ring-based lattice cryptography.

[Skip to Readme]
Versions [faq],,,,,,,,, (info)
Dependencies arithmoi (>= && <0.5), base (==4.8.*), constraints (==0.4.*), containers (>= && <0.6), data-default (>=0.3.0 && <0.6), deepseq (>= && <1.5), MonadRandom (>=0.2 && <0.5), mtl (>=2.2.1 && <2.3), numeric-prelude (>=0.4.2 && <0.5), QuickCheck (==2.8.*), random (==1.1.*), reflection (>=1.5.1 && <2.2), repa (==3.4.*), singletons (>= && <2.1), storable-record (>=0.0.3 && <0.1), storable-tuple (>=0.0.1 && <0.1), tagged-transformer (>=0.7 && <0.9), th-desugar (>=1.5.4 && <1.6), transformers (>= && <0.5), type-natural (>= && <0.4), vector (==0.11.*), vector-th-unbox (>= && <0.3) [details]
License GPL-2.0-only
Copyright Eric Crockett, Chris Peikert
Author Eric Crockett <>, Chris Peikert <>
Maintainer Eric Crockett <>
Revised Revision 1 made by crockeea at Sat Oct 31 03:25:01 UTC 2015
Category Crypto
Home page
Bug tracker
Source repo head: git clone
Uploaded by crockeea at Sat Oct 31 03:07:20 UTC 2015
Distributions NixOS:
Downloads 3789 total (81 in the last 30 days)
Rating (no votes yet) [estimated by rule of succession]
Your Rating
  • λ
  • λ
  • λ
Status Hackage Matrix CI
Docs available [build log]
Last success reported on 2015-10-31 [all 1 reports]





Use ICC instead of GCC to compile C backend.


Compile via LLVM. This produces much better object code, but you need to have the LLVM compiler installed.


Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info


Note: This package has metadata revisions in the cabal description newer than included in the tarball. To unpack the package including the revisions, use 'cabal get'.

Maintainer's Corner

For package maintainers and hackage trustees

Readme for lol-

[back to package description]
Overview of key modules, roughly from highest- to lowest-level:

* SymmSHE.hs, an implementation of a symmetric-key,
  somewhat-homomorphic encryption scheme that is essentially
  equivalent to the one from the toolkit paper [LPR'13].

* Cyc.hs, which defines an interface for using cyclotomic fields, 
  rings R, and quotient rings Rq=R/qR; as well as many other
  commonly used operations, e.g., converting
  between rings, decoding and decomposing elements, modulus
  reduction/rounding, etc. etc. Cyc is a safe wrapper around the
  UCyc type, which exposes some representation-dependent operations.
  UCyc (and hence Cyc) is implemented using a generic Tensor (described below).

* Tensor.hs, which defines a class that encapsulates all the necessary
  linear transformations for operating on representations of R- and
  Rq-elements, e.g., the CRT transform, converting between the
  powerful and decoding bases, generating error terms, etc.

* RepaTensor.hs, which gives an
  implementation of the Tensor class based on the "repa"
  package, a highly optimized and parallelizable array library.

* CTensor.hs, which gives an
  implementation of the Tensor class using a C backend via Haskell's FFI.

* FiniteField.hs, which gives an unoptimized implementation of finite field
  arithmetic. To use this module, you will need an instance of IrreduciblePoly.
  These instances provide irreducible polynomials for various degrees and base fields.
  One instance is provided for characteristic 2 fields of size up to 2^32 in 

* ZqBasic.hs, which is a basic implementation of Zq=Z/qZ arithmetic.

* Factored.hs, which contains support code for "reifying"
  runtime-chosen integers as static types (mainly, the types q and m
  that are floating around as parameters of many other data types),
  and "reflecting" those types as integers back to the code.