KULeuven-COSIC / SABERLinks
SABER is a Module-LWR based KEM submitted to NIST
☆50Updated 3 years ago
Alternatives and similar repositories for SABER
Users that are interested in SABER are comparing it to the libraries listed below
Sorting:
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆50Updated 2 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆112Updated this week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆56Updated 4 months ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆150Updated 3 weeks ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆112Updated 3 weeks ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆48Updated last year
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆53Updated last year
- Security Estimation Scripts for Kyber and Dilithium☆42Updated 4 years ago
- ☆53Updated 8 years ago
- An attempt at a new LWE estimator☆310Updated 2 weeks ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆373Updated 3 months ago
- MLKEM implementation optimized for embedded microcontrollers☆26Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 4 months ago
- Experimental implementation of KEMTLS in Rustls☆33Updated last year
- ☆43Updated 11 months ago
- CryptoBib Database for Developers☆45Updated last week
- CryptoBib BibTex files☆62Updated last week
- NTT-based Fast Lattice library☆177Updated 3 years ago
- ☆57Updated last year
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A list of the state of IETF protocols and PQC☆72Updated 4 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 4 years ago
- The General Sieve Kernel☆125Updated 3 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆98Updated 2 years ago
- ☆17Updated 3 years ago
- Raccoon Signature Scheme -- Reference Code☆11Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆38Updated 11 months ago