lucasprabel / module_gaussian_latticeView external linksLinks
☆14Dec 8, 2021Updated 4 years ago
Alternatives and similar repositories for module_gaussian_lattice
Users that are interested in module_gaussian_lattice are comparing it to the libraries listed below
Sorting:
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Dec 13, 2023Updated 2 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆25Aug 29, 2018Updated 7 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆48Jun 14, 2016Updated 9 years ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- Security Estimation Scripts for Kyber and Dilithium☆48Mar 16, 2021Updated 4 years ago
- Lattice-based signature schemes☆11Nov 17, 2023Updated 2 years ago
- ☆10May 10, 2016Updated 9 years ago
- Cairo 1 workshop repository for ETHDenver 2023☆10Mar 3, 2023Updated 2 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Mar 3, 2016Updated 9 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- ☆10Oct 24, 2022Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- ☆11May 7, 2020Updated 5 years ago
- ☆12Aug 19, 2024Updated last year
- ☆11Jan 17, 2024Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆11Apr 1, 2023Updated 2 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- A mutation testing CLI tool built in Rust. Currently supports Noir as a target language☆12Dec 2, 2024Updated last year
- ☆13Mar 6, 2023Updated 2 years ago
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆12Apr 26, 2013Updated 12 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 5 years ago
- A high-performance tool for Zcash blockchain science and exploration☆10Jul 5, 2019Updated 6 years ago
- ☆11Mar 19, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Oct 5, 2023Updated 2 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- ☆16Nov 22, 2022Updated 3 years ago
- An Implementation of the Number Theoretic Transform☆51Aug 23, 2023Updated 2 years ago
- ⚙️ Rules core smart contracts☆12Nov 24, 2023Updated 2 years ago
- Java implementation of 3GPP™ TS 35.206 Milenage algorithm☆13Oct 15, 2016Updated 9 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- Solidity Merkle Mountain Range library☆12Jul 26, 2024Updated last year
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 6 years ago
- Uses magic (zk) to distribute gifts (rewards) to kids (validators)☆13May 9, 2025Updated 9 months ago
- Repository containing code accompanying the paper "Aggregating Falcon Signatures With LaBRADOR".☆14May 26, 2024Updated last year
- SM4的优化实现,比官网上的实现快5-6倍☆13May 29, 2019Updated 6 years ago
- Hi-C data analysis tool☆13May 31, 2017Updated 8 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago