keccaksasca / keccaksasca
☆10Updated last year
Alternatives and similar repositories for keccaksasca:
Users that are interested in keccaksasca are comparing it to the libraries listed below
- ☆16Updated 4 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆49Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆25Updated last year
- ☆19Updated 2 months ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆33Updated 4 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- ☆47Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Side-Channel Analysis Library☆78Updated last week
- Hardware implementation of Saber☆7Updated 4 years ago
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆10Updated last year
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆10Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- ☆30Updated 5 months ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆29Updated 5 months ago
- ☆21Updated 2 years ago
- Module-Lattice-based Digital Signature Standard Standard by NIST i.e. FIPS 204☆40Updated 2 months ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆28Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- Security Estimation Scripts for Kyber and Dilithium☆29Updated 3 years ago
- ☆53Updated 7 months ago
- An Implementation of the Number Theoretic Transform☆41Updated last year
- processor for post-quantum cryptography☆14Updated 4 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- ☆13Updated 3 months ago
- ☆11Updated 3 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆9Updated 2 weeks ago