friends-of-quaternions / deuringView external linksLinks
☆15Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for deuring
Users that are interested in deuring are comparing it to the libraries listed below
Sorting:
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 10 months ago
- ☆44Feb 28, 2023Updated 2 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆17May 17, 2024Updated last year
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- Is SIKE broken yet?☆20Feb 15, 2023Updated 3 years ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Oct 19, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 2 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- ☆42May 29, 2024Updated last year
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 2 years ago
- ☆18Updated this week
- Proof assistant for qRHL☆22Feb 5, 2026Updated last week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Aug 5, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 4 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆28Oct 7, 2021Updated 4 years ago
- Quantum implementation of elliptic curve primitives☆33May 20, 2022Updated 3 years ago
- ☆112Apr 22, 2025Updated 9 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- Official SQIsign code, version under continuous development☆52Jun 19, 2025Updated 7 months ago
- Matrix Product State algorithm for computing characters of the symmetric group S_n☆11Sep 26, 2025Updated 4 months ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- Verifying encodings into propositional logic in Lean☆14Aug 14, 2023Updated 2 years ago
- This RocketchatApp validates uploaded images against the Microsoft PhotoDNA cloud service and quarantines those identified as child abuse…☆12Nov 17, 2025Updated 3 months ago
- Using SVF in Python Projects☆15Feb 6, 2026Updated last week
- ☆10Apr 10, 2020Updated 5 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- derper's mom☆13Oct 28, 2025Updated 3 months ago
- ☆16Jun 22, 2024Updated last year
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated last month