SRI-CSL / Bliss
BLISS: Bimodal Lattice Signature Schemes
☆25Updated 4 years ago
Alternatives and similar repositories for Bliss:
Users that are interested in Bliss are comparing it to the libraries listed below
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- ☆48Updated 7 years ago
- lattice-based digital signature scheme qTESLA☆31Updated 5 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆44Updated 7 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆54Updated 7 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆59Updated 2 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆128Updated 2 months ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- SageMath library for constructing elliptic curves☆67Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆41Updated 4 years ago
- Security Estimation Scripts for Kyber and Dilithium☆29Updated 3 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆11Updated 6 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Crypto library☆55Updated 3 months ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- ☆49Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆63Updated 3 months ago