formosa-crypto / formosa-mlkem
☆15Updated 2 weeks ago
Alternatives and similar repositories for formosa-mlkem:
Users that are interested in formosa-mlkem are comparing it to the libraries listed below
- Crypto library☆58Updated last week
- Examples for EasyCrypt Lectures☆24Updated 2 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- MAYO C implementation☆16Updated 2 weeks ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆50Updated last year
- Experiments with Universal Composability in EasyCrypt☆33Updated this week
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 7 months ago
- A foundational framework for modular cryptographic proofs in Coq☆64Updated last week
- The Squirrel Prover repository. An interactive prover for the formal verification of security protocols.☆52Updated last month
- ☆13Updated this week
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 10 months ago
- ☆18Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆31Updated last month
- ☆30Updated last year
- Proof assistant for qRHL☆19Updated 2 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated 10 months ago
- ☆16Updated last month
- Super Amazing Universal Composability, Yeah!☆34Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Reference repository on Lattice-based Cryptography☆24Updated 5 months ago
- A polymorphic interface for elliptic curve operations☆42Updated last year
- ☆35Updated 8 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆67Updated 4 years ago
- ☆47Updated last week
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆60Updated 9 months ago
- Specifications of cryptographic algorithms in Cryptol☆40Updated this week
- DEciding Equivalence Properties in SECurity protocols☆18Updated 2 years ago
- A repository of tools for verifying constant-timeness☆18Updated 2 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago