grocid / libPQPLinks
π₯  A Python post-quantum cryptography library
β65Updated 9 years ago
Alternatives and similar repositories for libPQP
Users that are interested in libPQP are comparing it to the libraries listed below
Sorting:
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"β89Updated 6 years ago
 - Post-quantum key exchange from the learning with errors problem β from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Keyβ¦β48Updated 8 years ago
 - Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ74Updated 7 years ago
 - A Python implementation of the SPHINCS-256 schemeβ15Updated 9 years ago
 - β100Updated 9 years ago
 - lattice-based digital signature scheme qTESLAβ32Updated 5 years ago
 - DEPRECATED β See NOTICE below about migration to new repository βΒ Post-quantum key exchange from the ring learning with errors problemβ59Updated 9 years ago
 - Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Schemeβ15Updated 9 years ago
 - The public repository of the Loopix mix systemβ72Updated 8 years ago
 - Cryptanalysis code for the SIMON and SPECK families of block ciphersβ20Updated 9 years ago
 - An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystemβ44Updated 10 years ago
 - Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ29Updated 7 years ago
 - Optimized implementation of the Picnic signature schemeβ82Updated 3 years ago
 - IOTA's hash function curl is brokenβ172Updated 5 years ago
 - NTRU Python Library with Application to Encrypted Domainβ31Updated 5 months ago
 - C Implementation of NTRUEncryptβ216Updated 4 years ago
 - Timing Attack on TLS' ECDSA signatureβ46Updated 10 years ago
 - free crypto auditβ31Updated 8 years ago
 - A python library that implements a number of Privacy Enhancing Technolgiesβ135Updated 3 years ago
 - Links to stuff arising from or related to the HACS workshop.β34Updated 7 years ago
 - This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEPβ31Updated 7 years ago
 - Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic aβ¦β37Updated 3 years ago
 - Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Schemeβ16Updated 9 years ago
 - Haraka is a secure and efficient short-input hash function.β57Updated 8 years ago
 - This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.β61Updated 2 years ago
 - β144Updated 6 months ago
 - Reference implementations (software)β85Updated 8 years ago
 - Elliptic Curve Cryptography playground/toolkit written in pure Pythonβ68Updated 2 years ago
 - A cryptographic method that defends against side-channel attacksβ25Updated 8 years ago
 - CryptoBib Main Repository for Developersβ20Updated last year