aadomn / skinny
Efficient constant-time implementations of SKINNY-128
☆11Updated 3 weeks ago
Alternatives and similar repositories for skinny:
Users that are interested in skinny are comparing it to the libraries listed below
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 7 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆31Updated this week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- High-assurance, high-performance C90 implementation of ML-KEM☆27Updated this week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Lean cryptographic library usable for bare-metal environments☆31Updated this week
- Reference repository on Lattice-based Cryptography☆23Updated 2 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Implementation of cryptographic primitives in Go☆12Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- Fast constant-time AES implementations on 32-bit architectures☆62Updated 3 months ago
- Banquet implementation☆13Updated 2 years ago
- ☆18Updated 2 months ago
- Crypto library☆55Updated 3 months ago
- Formal Analysis of the PQXDH Protocol☆24Updated 7 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Hashing to Elliptic Curves☆80Updated 4 months ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Raccoon Signature Scheme -- Reference Code☆9Updated last year
- A curated list of cryptography papers, articles, tutorials and howtos.☆7Updated 11 months ago
- ☆16Updated 2 years ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago