hbhdytf / PinSketch
Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
☆13Updated 10 years ago
Related projects: ⓘ
- A Python implementation of fuzzy extractor.☆53Updated last year
- Cryptographic Key Generation from Biometric Data☆13Updated 6 years ago
- NTRU Python Library with Application to Encrypted Domain☆28Updated 7 months ago
- ☆32Updated 2 years ago
- ECC Basic Math Library for C, python and Go☆16Updated 7 months ago
- Implementation of cryptographic program obfuscation☆41Updated 6 years ago
- Homomorphic Encryption in Python☆20Updated 6 years ago
- ☆22Updated 2 years ago
- A Python implementation of the SPHINCS-256 scheme☆14Updated 8 years ago
- Privacy mechanisms for decentralized fingerprint-based authentication☆10Updated 4 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆62Updated 6 years ago
- ☆97Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆130Updated last year
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆35Updated 6 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆50Updated 6 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆43Updated 7 years ago
- ☆48Updated 7 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆43Updated 8 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- BLISS: Bimodal Lattice Signature Schemes☆25Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆21Updated 2 months ago
- A simplified implementation of the fuzzy vault algorithm for biometric data☆21Updated 9 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 10 months ago
- A bitsliced implementation of ECB and CTR AES☆46Updated last month
- CryptoBib Database for Developers☆40Updated last week
- OpenPGP Long Key ID Collider☆14Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆114Updated 2 years ago