eltonlaw / diehardLinks
Test for randomness in data.
☆21Updated 3 years ago
Alternatives and similar repositories for diehard
Users that are interested in diehard are comparing it to the libraries listed below
Sorting:
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 2 years ago
- XKCP-extracted code for KangarooTwelve (K12)☆52Updated 3 weeks ago
- Implementation of ECM (Lenstra elliptic curve factorization). Small part of my Master Thesis, which I would like to share.☆12Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆153Updated 2 months ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- An Experimental Rust Crate for Post-Quantum Code-Signing Certificates.☆25Updated 3 years ago
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆184Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆166Updated 2 years ago
- ☆23Updated 3 years ago
- ☆38Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Circuits for functions of interest to cryptography☆28Updated last year
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- Raw data for numerical experiments exploring integer factorization on NISQ devices☆10Updated 7 years ago
- ECM Factorization on CUDA-GPUs☆13Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆83Updated 4 years ago
- Python Cryptograpy☆19Updated 3 years ago
- Lenstra's factorization algorithm in Python☆16Updated 8 years ago
- SHA256-SAT-BITCOIN☆24Updated 9 years ago
- ☆32Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆31Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 3 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- General number field sieve for python☆18Updated 10 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆196Updated last year
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 5 years ago
- Rainbow signature system for Round THREE submission☆20Updated 5 years ago