WvanWoerden / NTRUFatigueView external linksLinks
☆17Feb 21, 2022Updated 3 years ago
Alternatives and similar repositories for NTRUFatigue
Users that are interested in NTRUFatigue are comparing it to the libraries listed below
Sorting:
- Implementation of Multi-Key TFHE [KMS22]☆18Jan 24, 2024Updated 2 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆52Sep 26, 2024Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- ☆10Jan 29, 2025Updated last year
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- DNS Stamp encoding/decoding library for node☆15May 22, 2022Updated 3 years ago
- Build docker images for dsvpn.☆17Jan 28, 2021Updated 5 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Scripts to generate data for security parameters constraints section☆17Dec 11, 2024Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- ☆25Sep 25, 2024Updated last year
- This software provides a reference code of the low-latency cryptographic permutation algorithm Areion.☆18Jun 26, 2025Updated 7 months ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Internet-Draft on IP address privacy☆17Mar 30, 2025Updated 10 months ago
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆18Jun 11, 2025Updated 8 months ago
- ☆25May 14, 2025Updated 9 months ago
- ☆23Dec 5, 2025Updated 2 months ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- A programming language to write bitsliced ciphers☆59Sep 4, 2024Updated last year
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Sep 10, 2018Updated 7 years ago
- DNS proxy for enabling any application to use DNS Over HTTPS/DNS Over TLS/DNSCrypt☆22Aug 8, 2021Updated 4 years ago
- Specifications for Privacy Proxy Implementations☆32Feb 8, 2026Updated last week
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated last year
- A tweakable block cipher☆31May 17, 2024Updated last year
- ☆71Dec 5, 2024Updated last year
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Jun 24, 2023Updated 2 years ago
- We are a community of researchers and developers interested in advancing homomorphic encryption and other secure computation techniques.☆65Updated this week
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆30Mar 28, 2025Updated 10 months ago
- Create and parse DNS stamps with ease.☆33Dec 12, 2025Updated 2 months ago
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated 11 months ago
- Simple password-based file encryption entirely in your browser, interoperable with Cloaker.☆42Apr 23, 2022Updated 3 years ago
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 13 years ago
- Experimental implementation of KEMTLS in Rustls☆34Nov 11, 2025Updated 3 months ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- ☆98Feb 9, 2026Updated last week