davidmcgrew / hash-sigsLinks
A python implementation of Leighton-Micali hierarchical hash based signatures
☆17Updated 8 years ago
Alternatives and similar repositories for hash-sigs
Users that are interested in hash-sigs are comparing it to the libraries listed below
Sorting:
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆45Updated 2 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- pure-python routines for curve25519/ed25519☆36Updated 5 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 7 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆48Updated 8 years ago
- hash based digital signatures, XMSS, quantum resistant☆18Updated 3 years ago
- ☆100Updated 9 years ago
- Rainbow signature system for Round THREE submission☆20Updated 5 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆150Updated 2 weeks ago
- Optimized implementation of the Picnic signature scheme☆81Updated 3 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆190Updated last year
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- 👥 A Python post-quantum cryptography library☆65Updated 9 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- ☆36Updated 3 years ago
- Simple python implementation of McEliece cryptosystem☆34Updated 4 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆180Updated 5 years ago
- Very small, readable implementation of the SHA3 hash function.☆218Updated 9 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- A python implementation of the signature scheme Falcon☆181Updated last year
- Circuits for functions of interest to cryptography☆28Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆38Updated 7 months ago
- Λ ⚬ λ: Functional Lattice Cryptography☆230Updated 4 years ago
- Code of Round5☆11Updated 5 years ago
- A Python implemented McEliece Cryptosystem☆12Updated 2 years ago
- ☆51Updated 2 years ago