Additional implementation of BIKE (Bit Flipping Key Encapsulation)
☆53Apr 11, 2024Updated last year
Alternatives and similar repositories for bike-kem
Users that are interested in bike-kem are comparing it to the libraries listed below
Sorting:
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 8 months ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆411Jan 6, 2026Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆159Updated this week
- ☆19Nov 22, 2025Updated 3 months ago
- ☆12Jan 13, 2022Updated 4 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆14Jan 6, 2026Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- MLKEM implementation optimized for embedded microcontrollers☆28Dec 1, 2025Updated 3 months ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Starky implementation of Bls12-381☆13May 16, 2024Updated last year
- Clean, portable, tested implementations of post-quantum cryptography☆886Jan 9, 2026Updated 2 months ago
- A simple, commented and readable python implementation of ChaCha, Salsa, Poly1305, MD2, MD4, MD5, SHA1, SHA2, SHA3, Blake, Blake2, DES, 3…☆10Aug 10, 2024Updated last year
- A comprehensive list of post-quantum crypto schemes and their properties☆13May 3, 2024Updated last year
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Feb 2, 2017Updated 9 years ago
- cprops - C Prototyping Tools☆12Jul 27, 2012Updated 13 years ago
- ☆10Apr 5, 2019Updated 6 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated 2 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- ☆17Jul 31, 2022Updated 3 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- ☆16Oct 29, 2023Updated 2 years ago
- C implementation of Elligator 2 for Curve25519☆30Jun 26, 2021Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Side Channels Analysis and Deep Learning☆233Dec 31, 2025Updated 2 months ago
- Proof assistant for qRHL☆22Mar 9, 2026Updated last week
- ☆44Jun 27, 2022Updated 3 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 4 months ago
- ☆13Nov 2, 2023Updated 2 years ago