Additional implementation of BIKE (Bit Flipping Key Encapsulation)
☆53Apr 11, 2024Updated 2 years ago
Alternatives and similar repositories for bike-kem
Users that are interested in bike-kem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 10 months ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 4 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆425Jan 6, 2026Updated 4 months ago
- ☆20Nov 22, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Jan 13, 2022Updated 4 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆184May 13, 2026Updated last week
- Side-Channel Analysis Library☆112Apr 10, 2026Updated last month
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆14Jan 6, 2026Updated 4 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- ☆10Jun 28, 2016Updated 9 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 22, 2026Updated 3 weeks ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- MLKEM implementation optimized for embedded microcontrollers☆29Dec 1, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆29Feb 27, 2024Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- Starky implementation of Bls12-381☆13May 16, 2024Updated 2 years ago
- A comprehensive list of post-quantum crypto schemes and their properties☆14Mar 24, 2026Updated last month
- Clean, portable, tested implementations of post-quantum cryptography☆914Jan 9, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Feb 2, 2017Updated 9 years ago
- cprops - C Prototyping Tools☆12Jul 27, 2012Updated 13 years ago
- ☆12Apr 5, 2019Updated 7 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆39Dec 16, 2021Updated 4 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆14Mar 15, 2024Updated 2 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- ☆17Jul 31, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Apr 8, 2022Updated 4 years ago
- ☆18Oct 29, 2023Updated 2 years ago
- This is an implementation of embedding and extracting a digital watermark in a PDF document. The code uses an LDPC code, a Hadamard code,…☆15Oct 28, 2017Updated 8 years ago
- C++, OpenCV, Qt☆12Sep 14, 2015Updated 10 years ago
- C implementation of Elligator 2 for Curve25519☆31Jun 26, 2021Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Side Channels Analysis and Deep Learning☆242Dec 31, 2025Updated 4 months ago