grocid / libPQPLinks
π₯ A Python post-quantum cryptography library
β65Updated 9 years ago
Alternatives and similar repositories for libPQP
Users that are interested in libPQP are comparing it to the libraries listed below
Sorting:
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"β89Updated 6 years ago
- Post-quantum key exchange from the learning with errors problem β from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Keyβ¦β48Updated 8 years ago
- The public repository of the Loopix mix systemβ72Updated 8 years ago
- C Implementation of NTRUEncryptβ214Updated 4 years ago
- A Python implementation of the SPHINCS-256 schemeβ15Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystemβ44Updated 10 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ74Updated 7 years ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)β321Updated 3 years ago
- DEPRECATED β See NOTICE below about migration to new repository βΒ Post-quantum key exchange from the ring learning with errors problemβ59Updated 9 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.β61Updated 2 years ago
- β100Updated 9 years ago
- NTRU Python Library with Application to Encrypted Domainβ31Updated 4 months ago
- lattice-based digital signature scheme qTESLAβ32Updated 5 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Schemeβ15Updated 9 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Projectβ29Updated 7 years ago
- A cryptographic method that defends against side-channel attacksβ25Updated 8 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphersβ20Updated 9 years ago
- IOTA's hash function curl is brokenβ172Updated 5 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"β11Updated 6 years ago
- Optimized implementation of the Picnic signature schemeβ81Updated 3 years ago
- An android front-end to the zcash wallet through onion servicesβ14Updated 8 years ago
- Timing Attack on TLS' ECDSA signatureβ46Updated 10 years ago
- free crypto auditβ31Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.β34Updated 7 years ago
- β58Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEPβ31Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgiesβ135Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memoryβ61Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic aβ¦β37Updated 3 years ago
- A malicious cryptocurrencyβ51Updated 9 years ago