hbhdytf / PinSketch
Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
☆14Updated 10 years ago
Alternatives and similar repositories for PinSketch:
Users that are interested in PinSketch are comparing it to the libraries listed below
- A Python implementation of fuzzy extractor.☆57Updated last year
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆13Updated 9 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 6 months ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 6 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Cryptographic Key Generation from Biometric Data☆13Updated 6 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆35Updated 2 weeks ago
- Implementation of cryptographic program obfuscation☆41Updated 7 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- ☆32Updated 3 years ago
- A C++ implementation of the DUPLO cryptographic protocol☆22Updated 7 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- C Implementation of NTRUEncrypt☆209Updated 3 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- MLKEM implementation optimized for embedded microcontrollers☆16Updated 6 months ago
- Some lightweight cryptography algorithms optimized for x86☆22Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆45Updated 7 years ago
- CryptoBib Database for Developers☆43Updated last month
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆129Updated 2 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated 2 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- ☆15Updated 3 years ago
- MAYO C implementation☆14Updated 2 weeks ago
- Implementations of some lightweight block ciphers in C☆19Updated 6 years ago
- An open source project for study S-boxes☆38Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week