hbhdytf / PinSketch
Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
☆14Updated 11 years ago
Alternatives and similar repositories for PinSketch
Users that are interested in PinSketch are comparing it to the libraries listed below
Sorting:
- A Python implementation of fuzzy extractor.☆59Updated last year
- High-order countermeasures for AES and DES☆25Updated 9 months ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 9 months ago
- ☆35Updated 3 years ago
- Security Estimation Scripts for Kyber and Dilithium☆38Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Cryptographic Key Generation from Biometric Data☆13Updated 7 years ago
- NewHope key exchange mechanism implementation on Cortex-M series microcontrollers.☆13Updated 8 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆26Updated 10 years ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- builds a BCH code correcting an arbitrary number of errors☆9Updated 2 months ago
- Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.☆30Updated 8 months ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 2 weeks ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 6 years ago
- ☆50Updated 7 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated 2 years ago
- ☆23Updated 2 years ago
- NTRU Python Library with Application to Encrypted Domain☆31Updated last year
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆135Updated 5 months ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Updated 9 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆46Updated 3 months ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Error Correction Codes - C☆11Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated last month