Chair-for-Security-Engineering / BIKELinks
Contains HDL code for the PQC Key Encapsulation Mechanism BIKE
☆21Updated last year
Alternatives and similar repositories for BIKE
Users that are interested in BIKE are comparing it to the libraries listed below
Sorting:
- Crypto library☆67Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆135Updated this week
- Secure, fast, and portable C90 implementation of ML-DSA / FIPS 204☆48Updated this week
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Updated 2 years ago
- A depth-aware secure computation compiler☆17Updated 8 months ago
- MAYO C implementation☆22Updated 10 months ago
- Experiments with Universal Composability in EasyCrypt☆43Updated this week
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆39Updated 10 months ago
- spqlios arithmetic library for FHE and post-quantum crypto☆26Updated 2 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆16Updated this week
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Official SQIsign code, version under continuous development☆52Updated 7 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Updated 8 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆401Updated last month
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Updated last year
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆158Updated 4 months ago
- Raccoon Signature Scheme -- Reference Code☆12Updated 2 years ago
- An experimental high-performance cryptosystem.☆13Updated last year
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆214Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Examples for EasyCrypt Lectures☆27Updated 2 weeks ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆54Updated 2 years ago
- ☆15Updated 2 weeks ago
- ☆23Updated 7 years ago
- ☆57Updated last year
- SageMath library for constructing elliptic curves☆74Updated 2 years ago
- ☆19Updated 2 months ago