inmcm / kravatteLinks
Implementation of Kravatte Encryption Suite
☆15Updated 7 years ago
Alternatives and similar repositories for kravatte
Users that are interested in kravatte are comparing it to the libraries listed below
Sorting:
- ☆38Updated 4 years ago
- Mirror of all PDFs from the IACR's eprint☆48Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- CryptoBib Main Repository for Developers☆22Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Introduction to Secure Multi-Party Computations☆16Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆70Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Updated 7 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Updated 9 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Reference implementations of the GIMLI permutation☆15Updated 8 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆50Updated 14 years ago
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- ☆100Updated 9 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago