cisco / hash-sigs
A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.
☆39Updated 4 months ago
Alternatives and similar repositories for hash-sigs:
Users that are interested in hash-sigs are comparing it to the libraries listed below
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- Lean cryptographic library usable for bare-metal environments☆41Updated this week
- A python implementation of Leighton-Micali hierarchical hash based signatures☆17Updated 8 years ago
- Post-quantum cryptography certificates☆61Updated this week
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 3 weeks ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆70Updated last month
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated 2 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated 11 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆36Updated last month
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- A list of the state of IETF protocols and PQC☆53Updated 2 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆18Updated 2 weeks ago
- Security Estimation Scripts for Kyber and Dilithium☆35Updated 4 years ago
- ☆32Updated 3 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- MLKEM implementation optimized for embedded microcontrollers☆16Updated 7 months ago
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 8 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- MAYO C implementation☆16Updated 3 weeks ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆131Updated 4 months ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆83Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆51Updated this week
- CryptoBib Database for Developers☆44Updated 2 months ago