jschanck / ntru
Implementations of the NIST post-quantum cryptography process finalist NTRU.
☆43Updated 2 years ago
Alternatives and similar repositories for ntru:
Users that are interested in ntru are comparing it to the libraries listed below
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- Security Estimation Scripts for Kyber and Dilithium☆35Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆131Updated 4 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- Hashing to Elliptic Curves☆81Updated 6 months ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆38Updated 6 months ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 8 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- ☆49Updated last year
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 2 weeks ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- An attempt at a new LWE estimator☆251Updated 3 weeks ago
- CryptoBib Database for Developers☆44Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆51Updated this week
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 6 months ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆158Updated 11 months ago