dstebila / rlwekexLinks
DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem
☆59Updated 9 years ago
Alternatives and similar repositories for rlwekex
Users that are interested in rlwekex are comparing it to the libraries listed below
Sorting:
- ☆100Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- ☆58Updated 8 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆15Updated 9 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 4 years ago
- Optimized implementation of ring-TESLA☆11Updated 9 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆48Updated 8 years ago
- Reference implementations (software)☆85Updated 8 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- SIDH C reference implementation☆13Updated 8 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 9 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆78Updated 6 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 8 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- ☆53Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- A memory-hard password hashing function.☆70Updated 2 years ago
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 8 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- Experiments in homomorphic encryption☆31Updated 10 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 5 years ago
- An Implementation of Order-Revealing Encryption☆100Updated 5 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 3 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆150Updated 3 weeks ago
- CryptoBib Main Repository for Developers☆20Updated last year
- A CONIKS implementation in Java☆60Updated 7 years ago