SQISign / sqisign-ec23Links
Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical and secure SQISign signatures" (EUROCRYPT'23).
☆17Updated last year
Alternatives and similar repositories for sqisign-ec23
Users that are interested in sqisign-ec23 are comparing it to the libraries listed below
Sorting:
- Official SQIsign code, version under continuous development☆46Updated 5 months ago
- Official SQISignHD code, version under continuous development.☆12Updated 4 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆21Updated 10 months ago
- Is SIKE broken yet?☆20Updated 2 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- Experiments with Universal Composability in EasyCrypt☆42Updated last week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆29Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated last week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- MAYO C implementation☆19Updated 8 months ago
- ☆44Updated 2 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- SageMath library for constructing elliptic curves☆72Updated 2 years ago
- CryptoBib BibTex files☆62Updated 3 weeks ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 8 months ago
- Formal Analysis of the PQXDH Protocol☆29Updated last year
- Raccoon Signature Scheme -- Reference Code☆12Updated 2 years ago
- Hashing to Elliptic Curves☆80Updated last year
- Reference repository on Lattice-based Cryptography☆26Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- ☆27Updated last year
- An implementation of a post quantum anonymous credential scheme☆16Updated 11 months ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆116Updated this week
- ☆17Updated 2 weeks ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago