KULeuven-COSIC / SABERLinks
SABER is a Module-LWR based KEM submitted to NIST
☆50Updated 3 years ago
Alternatives and similar repositories for SABER
Users that are interested in SABER are comparing it to the libraries listed below
Sorting:
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year
- ☆19Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 8 months ago
- MLKEM implementation optimized for embedded microcontrollers☆23Updated 10 months ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆42Updated 8 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆32Updated 3 weeks ago
- ☆42Updated 6 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated last year
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- Security Estimation Scripts for Kyber and Dilithium☆39Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆141Updated 6 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- ☆52Updated 7 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated 2 years ago
- Benchmark on KPQClean☆6Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆46Updated last week
- An attempt at a new LWE estimator☆277Updated 2 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 10 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated 2 years ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆28Updated 2 months ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆66Updated this week
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆17Updated 4 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆81Updated this week
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆96Updated 2 months ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 3 months ago
- Saber and NTRU on M4 and AVX2☆17Updated 3 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Updated 9 years ago
- An implementation of the LowMC block cipher family.☆27Updated 7 years ago