eltonlaw / diehardLinks
Test for randomness in data.
☆21Updated 3 years ago
Alternatives and similar repositories for diehard
Users that are interested in diehard are comparing it to the libraries listed below
Sorting:
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆151Updated last month
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆194Updated last year
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆40Updated last month
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆37Updated 7 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- ECM Factorization on CUDA-GPUs☆13Updated 5 years ago
- Fork of OpenSSH that includes prototype quantum-resistant key exchange and authentication in SSH based on liboqs. PROJECT INACTIVE. CONTR…☆217Updated last month
- Reference implementation of the Picnic post-quantum signature scheme☆166Updated 2 years ago
- XKCP-extracted code for KangarooTwelve (K12)☆52Updated this week
- Python Cryptograpy☆19Updated 3 years ago
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆32Updated 2 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- An Experimental Rust Crate for Post-Quantum Code-Signing Certificates.☆25Updated 3 years ago
- General number field sieve for python☆18Updated 10 years ago
- ☆36Updated 3 years ago
- A collection of high-performance crypto implementations.☆52Updated this week
- The BLAKE3 paper: specifications, analysis, and design rationale☆182Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- A implementation of Shor's algorithm written in Python calling Q# for the quantum part☆30Updated 6 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆31Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cry…☆119Updated 5 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- RSA blind signatures in Rust☆29Updated 7 months ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆102Updated 8 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆53Updated last year
- ☆100Updated 9 years ago