WvanWoerden / NTRUFatigue
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for NTRUFatigue
- The fully homomorhic encryption scheme based on NTRU and LWE.☆35Updated last month
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆38Updated last year
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- ☆14Updated this week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆25Updated 5 months ago
- Banquet implementation☆13Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- ☆39Updated 7 months ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- Experiments with Universal Composability in EasyCrypt☆32Updated this week
- CryptoBib Database for Developers☆40Updated last week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 4 years ago
- Pure C++ Ver. of TFHE.☆84Updated last month
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- A library for lattice-based homomorphic encryption in Go☆12Updated 2 years ago
- CryptoBib BibTex files☆52Updated last month
- Experimental implementation of KEMTLS in Rustls☆27Updated last year
- ☆28Updated 3 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆14Updated 3 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Security Estimation Scripts for Kyber and Dilithium☆25Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆23Updated 2 weeks ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago