SRI-CSL / Bliss
BLISS: Bimodal Lattice Signature Schemes
☆25Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Bliss
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆79Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- An Implementation of the Number Theoretic Transform☆37Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆44Updated 7 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- ☆32Updated 2 years ago
- ☆48Updated 7 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- The garbled circuit backend for the ObliVM framework☆17Updated 8 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Haraka is a secure and efficient short-input hash function.☆52Updated 7 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- ☆35Updated 7 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆38Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆61Updated last month
- Security Estimation Scripts for Kyber and Dilithium☆25Updated 3 years ago
- ☆42Updated last week
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆120Updated last year
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- ☆50Updated last year