inmcm / kravatteLinks
Implementation of Kravatte Encryption Suite
☆15Updated 7 years ago
Alternatives and similar repositories for kravatte
Users that are interested in kravatte are comparing it to the libraries listed below
Sorting:
- ☆38Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- CryptoBib Main Repository for Developers☆21Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- Auditing Applied Cryptography☆11Updated 6 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- Introduction to Secure Multi-Party Computations☆16Updated 7 years ago
- ☆22Updated 9 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 6 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆30Updated 6 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 6 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆69Updated 3 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- Circuits for functions of interest to cryptography☆28Updated last year