J08nY / std-curvesLinks
Standard curve database.
☆121Updated last month
Alternatives and similar repositories for std-curves
Users that are interested in std-curves are comparing it to the libraries listed below
Sorting:
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆82Updated 2 months ago
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 7 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆91Updated 3 years ago
- ☆57Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Post-quantum cryptography certificates☆76Updated this week
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆55Updated 2 weeks ago
- A list of the state of IETF protocols and PQC☆73Updated 7 months ago
- C++ library for Finite Fields and Elliptic Curves☆168Updated 4 years ago
- CryptoBib Database for Developers☆46Updated 2 weeks ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 7 months ago
- ☆24Updated 3 years ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆128Updated 6 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- Library for elliptic curves cryptography☆60Updated 11 months ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- Optimized Binary GCD for Modular Inversion☆50Updated 5 years ago
- Hashing to Elliptic Curves☆80Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆210Updated last year
- Deployments of fancy cryptography☆171Updated 3 months ago
- ☆52Updated 2 years ago