PQShield / nist-sigs-zoo
Exploration of NIST post-quantum signatures on-ramp candidates
☆31Updated 2 months ago
Alternatives and similar repositories for nist-sigs-zoo:
Users that are interested in nist-sigs-zoo are comparing it to the libraries listed below
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- MAYO C implementation☆16Updated last month
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆46Updated 2 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 10 months ago
- Deployments of fancy cryptography☆140Updated this week
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆58Updated this week
- Crypto library☆58Updated last week
- Official SQIsign code, version under continuous development☆24Updated last month
- A list of the state of IETF protocols and PQC☆58Updated 3 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆20Updated last week
- MLKEM implementation optimized for embedded microcontrollers☆21Updated 8 months ago
- ☆14Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆44Updated this week
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- CryptoBib Main Repository for Developers☆19Updated 8 months ago
- ☆20Updated 7 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Hashing to Elliptic Curves☆81Updated 7 months ago
- ☆18Updated last month
- CryptoBib Database for Developers☆44Updated last month
- ☆55Updated 10 months ago
- Post-quantum cryptography certificates☆63Updated last month
- Security Estimation Scripts for Kyber and Dilithium☆38Updated 4 years ago
- ☆16Updated 3 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆41Updated 7 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago