grocid / libPQP
π₯ A Python post-quantum cryptography library
β64Updated 8 years ago
Alternatives and similar repositories for libPQP
Users that are interested in libPQP are comparing it to the libraries listed below
Sorting:
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"β90Updated 5 years ago
- Post-quantum key exchange from the learning with errors problem β from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Keyβ¦β46Updated 7 years ago
- A Python implementation of the SPHINCS-256 schemeβ15Updated 9 years ago
- NTRU Python Library with Application to Encrypted Domainβ31Updated last year
- DEPRECATED β See NOTICE below about migration to new repository βΒ Post-quantum key exchange from the ring learning with errors problemβ59Updated 8 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Schemeβ14Updated 9 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ76Updated 7 years ago
- free crypto auditβ31Updated 8 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Pythonβ67Updated 2 years ago
- β97Updated 8 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Schemeβ16Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgiesβ132Updated 2 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystemβ44Updated 9 years ago
- lattice-based digital signature scheme qTESLAβ32Updated 5 years ago
- Python Wrappers for Post-Quantum Cryptography, see: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissionsβ9Updated 6 years ago
- C Implementation of NTRUEncryptβ214Updated 3 years ago
- The public repository of the Loopix mix systemβ69Updated 7 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.β26Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEPβ31Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ28Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memoryβ60Updated 8 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)β52Updated 7 years ago
- Timing Attack on TLS' ECDSA signatureβ42Updated 9 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communicationβ11Updated 6 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphersβ20Updated 9 years ago
- The Tor Path Simulatorβ86Updated 8 years ago
- Symmetric somewhat homomorphic encryption library based on DGHVβ27Updated 7 years ago
- β50Updated 7 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservatiβ¦β135Updated 5 months ago
- CryptoBib Main Repository for Developersβ19Updated 8 months ago