This is the C implementation of the McEliece Cryptosystem based on QC-MDPC codes.
☆25Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for The-McEliece-Cryptosystem
Users that are interested in The-McEliece-Cryptosystem are comparing it to the libraries listed below
Sorting:
- A C++ implementaion of McEliece System using Goppa code 256☆10Sep 15, 2015Updated 10 years ago
- Standalone McEliece implemetation☆13Feb 11, 2017Updated 9 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Mar 2, 2026Updated last week
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated 2 months ago
- TLS/DTLS Library☆34Feb 10, 2026Updated 3 weeks ago
- The official WHMCS 7.5.3 Release, released by @lmsfao.☆10Apr 8, 2019Updated 6 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- gcnano-binaries☆11Feb 9, 2026Updated last month
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Miqra According to the Masorah in two JSON formats☆12Updated this week
- Rapid Blockchain Prototypes for Rust☆15Feb 27, 2026Updated last week
- Sandbank is the easy-to-use database for s&box.☆10Mar 9, 2025Updated last year
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 5 months ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Convert option-object style vue component to typescript class component☆12Feb 3, 2023Updated 3 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- 100% legal, FOSS reimplementation of Cubism Core☆11Mar 9, 2023Updated 3 years ago
- Fixes and tweaks for running linux on MECHREVO 14X☆12Mar 5, 2025Updated last year
- SonarQube plugin for the D programming language☆10Dec 13, 2018Updated 7 years ago
- Automatic Blue Archive (Global) decensorer☆10Oct 4, 2022Updated 3 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Unix-inspired shell and RAM filesystem for the Commodore 64 (6502 assembly) / AI-assisted development☆21Feb 27, 2026Updated last week
- Implementation of a simple genetic algorithm designed to solve the Traveling Salesman Problem, using ncurses to visualize the graph.☆11Nov 23, 2017Updated 8 years ago
- A complete economy & buy menu plugin for Sven Co-op 5.x☆10Sep 1, 2024Updated last year
- An interactive data table for Pluto.jl notebooks.☆10Nov 22, 2020Updated 5 years ago
- Implementation of a slotmap☆10Nov 24, 2025Updated 3 months ago
- A python code for HART-IP Specification☆12Aug 18, 2016Updated 9 years ago
- Convert ELF object files to DJGPP COFF-GO32 objects☆14Apr 16, 2024Updated last year
- The virtual console embedded in rCore kernel.☆11May 6, 2025Updated 10 months ago
- A compile time sized array of bits☆12Aug 15, 2021Updated 4 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- ☆15May 14, 2025Updated 9 months ago
- libzfs binding for Java☆12Feb 4, 2020Updated 6 years ago
- QuickJs based wrapper generator for WASM components in written in JavaScript☆15Updated this week
- Automatic Query Caching with ProxySQL and Readyset☆12Jun 2, 2025Updated 9 months ago
- Unix domain sockets for Tokio...on Windows!☆14Sep 28, 2022Updated 3 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- A proc macro regex library to match an arbitrary string or byte array to a regular expression.☆11Jun 5, 2022Updated 3 years ago