cpeikert / CollimationSieveLinks
Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.
☆14Updated 6 years ago
Alternatives and similar repositories for CollimationSieve
Users that are interested in CollimationSieve are comparing it to the libraries listed below
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- CryptoBib Main Repository for Developers☆22Updated last year
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆88Updated 6 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- SIDH C reference implementation☆13Updated 9 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- CryptoBib Database for Developers☆45Updated 2 weeks ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- ☆100Updated 9 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Updated 9 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- ☆12Updated 3 years ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- Tool to automatically search for linear characteristics☆39Updated 10 years ago
- Crypto library☆67Updated 2 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Updated last year
- ☆15Updated 2 weeks ago
- ☆28Updated 4 years ago
- Checking that functions are constant time with Valgrind☆196Updated 8 years ago
- ☆12Updated 4 years ago
- ☆38Updated 8 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 3 years ago
- Experiments with Universal Composability in EasyCrypt☆43Updated this week
- ☆42Updated last year