KULeuven-COSIC / SABER
SABER is a Module-LWR based KEM submitted to NIST
☆49Updated 2 years ago
Alternatives and similar repositories for SABER:
Users that are interested in SABER are comparing it to the libraries listed below
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Security Estimation Scripts for Kyber and Dilithium☆33Updated 3 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated 10 months ago
- ☆49Updated 7 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆129Updated 3 months ago
- ☆16Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- An attempt at a new LWE estimator☆249Updated last week
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆76Updated 6 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- MLKEM implementation optimized for embedded microcontrollers☆16Updated 6 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆52Updated last week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆38Updated 5 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆11Updated last year
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆29Updated 3 months ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆29Updated this week
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated last week
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- ☆16Updated 3 years ago
- An implementation of the LowMC block cipher family.☆26Updated 7 years ago
- The General Sieve Kernel☆106Updated 2 months ago
- An Implementation of the Number Theoretic Transform☆42Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year