SQISign / the-sqisign
Official SQIsign code, version under continuous development
☆14Updated 5 months ago
Related projects: ⓘ
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆10Updated 4 months ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆12Updated 2 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆26Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆47Updated 2 years ago
- Official SQISignHD code, version under continuous development.☆10Updated 2 weeks ago
- ☆31Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆21Updated 2 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆27Updated 2 weeks ago
- A BibTeX collection on Isogeny-based Cryptography☆18Updated last year
- The General Sieve Kernel☆102Updated last month
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆18Updated 3 months ago
- Hashing to Elliptic Curves☆79Updated last week
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆37Updated last year
- ☆12Updated last year
- Is SIKE broken yet?☆16Updated last year
- Reference repository on Lattice-based Cryptography☆22Updated 2 months ago
- CryptoBib BibTex files☆50Updated last week
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- Crypto library☆50Updated last month
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated last year
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 7 years ago
- toy implementation of bfv in rust☆18Updated 2 years ago
- An implementation of the LowMC block cipher family.☆24Updated 6 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆15Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆50Updated 6 years ago
- Examples for EasyCrypt Lectures☆22Updated 9 months ago