eltonlaw / diehardLinks
Test for randomness in data.
☆21Updated 3 years ago
Alternatives and similar repositories for diehard
Users that are interested in diehard are comparing it to the libraries listed below
Sorting:
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆181Updated 3 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆150Updated 2 weeks ago
- Raw data for numerical experiments exploring integer factorization on NISQ devices☆10Updated 7 years ago
- ☆23Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- An Experimental Rust Crate for Post-Quantum Code-Signing Certificates.☆25Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Circuits for functions of interest to cryptography☆28Updated last year
- XKCP-extracted code for KangarooTwelve (K12)☆51Updated last month
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆81Updated 4 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆31Updated 3 years ago
- Implementation of ECM (Lenstra elliptic curve factorization). Small part of my Master Thesis, which I would like to share.☆12Updated 3 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆190Updated last year
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- ☆36Updated 3 years ago
- A implementation of Shor's algorithm written in Python calling Q# for the quantum part☆30Updated 6 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- Is SIKE broken yet?☆19Updated 2 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- ☆82Updated 5 years ago
- Lenstra's factorization algorithm in Python☆16Updated 8 years ago
- Reference implementations of post-quantum cryptographic primitives☆32Updated last month
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.☆21Updated 3 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year