Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)
☆323Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for codecrypt
Users that are interested in codecrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- 👥 A Python post-quantum cryptography library☆64Sep 9, 2016Updated 9 years ago
- Post-quantum Cryptography VPN☆350Apr 6, 2023Updated 2 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- [unmaintenance] A experimental post-quantum cryptography library☆136May 14, 2019Updated 6 years ago
- ☆99Jul 31, 2016Updated 9 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- C library for prototyping and experimenting with quantum-resistant cryptography☆2,822Updated this week
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- A Playground for Variational Autoencoders☆12Feb 11, 2018Updated 8 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Jun 12, 2023Updated 2 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Aug 31, 2015Updated 10 years ago
- [DEPRECATED — See notice in README.md and switch to OpenSSL 3 OQS Provider] Fork of OpenSSL 1.1.1 that includes prototype quantum-resista…☆308Jan 5, 2026Updated 2 months ago
- The CEX Cryptographic library in C++☆64Mar 17, 2023Updated 3 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Jul 13, 2018Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆83Sep 2, 2022Updated 3 years ago
- ☆52Aug 19, 2017Updated 8 years ago
- Secure multi-party cloud backup solution based on Shamir's Secret Sharing scheme.☆29Nov 29, 2016Updated 9 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36May 30, 2018Updated 7 years ago
- Webbased post-quantum messenger application☆27Dec 8, 2020Updated 5 years ago
- C Implementation of NTRUEncrypt☆217Jun 7, 2021Updated 4 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆61Sep 12, 2016Updated 9 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Implementations of a fast Message-Authentication Code☆120Sep 28, 2022Updated 3 years ago
- A quick prototype of a Tox client powered by JS running everywhere.☆12Jul 27, 2016Updated 9 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Nov 21, 2019Updated 6 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆327Mar 3, 2023Updated 3 years ago
- Brainfuck compiler and interpreter☆17Jun 29, 2023Updated 2 years ago
- Zero-knowledge layer-2 payment channels☆23Jun 5, 2023Updated 2 years ago
- reveal hidden printer dot codes☆15Nov 11, 2018Updated 7 years ago