kjson / pyfactorLinks
General number field sieve for python
☆18Updated 10 years ago
Alternatives and similar repositories for pyfactor
Users that are interested in pyfactor are comparing it to the libraries listed below
Sorting:
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- SAT-based Bitcoin Mining☆88Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 7 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Updated 4 years ago
- 👥 A Python post-quantum cryptography library☆64Updated 8 years ago
- An efficient lattice-based cryptographic hash function☆27Updated 8 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆49Updated 10 years ago
- implementation of OEIS sequences☆11Updated 8 years ago
- Nayuki's implementation of cryptographic primitives used in Bitcoin.☆143Updated 3 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆101Updated 8 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆50Updated 14 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 3 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆12Updated 11 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 10 years ago
- A basic implementation of the Small Primes Number-Theoretic Transform (NTT) multiplication algorithm.☆24Updated 7 years ago
- distributed.net client public source code. (Note: this codebase does not have networking or buffer file capabilities)☆48Updated last year
- Implementations of the Simon and Speck Block Ciphers☆102Updated 7 years ago
- Python bindings for SPHINCS+☆22Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Code for the post "Elliptic Curves as Python Objects" implementing elliptic curve point addition over rational numbers.☆20Updated 5 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Updated 11 years ago
- ☆36Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- ECM Factorization on CUDA-GPUs☆13Updated 4 years ago