PQCMayo / MAYO-CLinks
MAYO C implementation
☆21Updated 10 months ago
Alternatives and similar repositories for MAYO-C
Users that are interested in MAYO-C are comparing it to the libraries listed below
Sorting:
- Crypto library☆67Updated last month
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆19Updated 2 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Official SQIsign code, version under continuous development☆52Updated 7 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆132Updated this week
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Updated last year
- Raccoon Signature Scheme -- Reference Code☆12Updated 2 years ago
- Examples for EasyCrypt Lectures☆27Updated last week
- Experiments with Universal Composability in EasyCrypt☆43Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Official SQISignHD code, version under continuous development.☆12Updated 6 months ago
- ☆28Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- ☆16Updated last week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 7 months ago
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆31Updated last year
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Updated 10 months ago
- ☆23Updated 9 months ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- CryptoBib Database for Developers☆46Updated this week
- ☆17Updated 5 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆54Updated 3 years ago