grocid / libPQPLinks
π₯ A Python post-quantum cryptography library
β65Updated 9 years ago
Alternatives and similar repositories for libPQP
Users that are interested in libPQP are comparing it to the libraries listed below
Sorting:
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"β89Updated 6 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ74Updated 8 years ago
- lattice-based digital signature scheme qTESLAβ32Updated 6 years ago
- C Implementation of NTRUEncryptβ216Updated 4 years ago
- Post-quantum key exchange from the learning with errors problem β from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Keyβ¦β50Updated 8 years ago
- A Python implementation of the SPHINCS-256 schemeβ15Updated 9 years ago
- DEPRECATED β See NOTICE below about migration to new repository βΒ Post-quantum key exchange from the ring learning with errors problemβ59Updated 9 years ago
- The public repository of the Loopix mix systemβ72Updated 8 years ago
- β100Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystemβ45Updated 10 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Schemeβ15Updated 9 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.β62Updated 3 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphersβ20Updated 9 years ago
- IOTA's hash function curl is brokenβ172Updated 6 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ29Updated 7 years ago
- NTRU Python Library with Application to Encrypted Domainβ31Updated 6 months ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)β322Updated 3 years ago
- free crypto auditβ31Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgiesβ135Updated 3 years ago
- Python Wrappers for Post-Quantum Cryptography, see: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissionsβ10Updated 7 years ago
- A cryptographic method that defends against side-channel attacksβ25Updated 9 years ago
- A browsable archive of all Underhanded Crypto Contest entries.β35Updated 6 years ago
- Timing Attack on TLS' ECDSA signatureβ46Updated 10 years ago
- Links to stuff arising from or related to the HACS workshop.β34Updated 7 years ago
- β58Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEPβ31Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done tβ¦β11Updated 10 years ago
- Reference implementations (software)β85Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic aβ¦β37Updated 3 years ago
- Optimized implementation of the Picnic signature schemeβ82Updated 3 years ago