practical quantum-secure key encapsulation from generic lattices
☆31Oct 28, 2025Updated 6 months ago
Alternatives and similar repositories for frodo
Users that are interested in frodo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Falcon signature and its ZKP extensions☆22Jul 5, 2022Updated 3 years ago
- Source files for ZKDL Lectures☆26Nov 17, 2025Updated 5 months ago
- implentation of Ligerito☆19Apr 16, 2026Updated 2 weeks ago
- A proof-of-concept implementation to evaluate a UTXO-based generalized channel construction in Bitcoin.☆13Dec 13, 2021Updated 4 years ago
- IO engine for Nim.☆10Jul 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Deep Learning w/ Nim using Arraymancer☆12Mar 1, 2022Updated 4 years ago
- MAYO C implementation☆28Apr 9, 2026Updated 3 weeks ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆158Sep 29, 2025Updated 7 months ago
- ☆26Dec 8, 2025Updated 4 months ago
- A Nim desktop shadertoy fragment shader player☆12Sep 14, 2024Updated last year
- Binary Editor☆22Jul 17, 2025Updated 9 months ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- Adaptive Neuro-Symbolic Network Agent☆14Oct 11, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The CYC1000 is the next generation of Arrow’s FPGA IoT/Maker boards based on the latest Intel FPGA family Cyclone 10 LP.☆10Jan 27, 2022Updated 4 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 7 months ago
- Artifact associated with CHES 2022 paper https://tches.iacr.org/index.php/TCHES/article/view/9817☆12Nov 10, 2023Updated 2 years ago
- ☆28Apr 6, 2022Updated 4 years ago
- Kryten is a CLI tool to ask questions and get sourced answers from any .pdf, .doc, .docx, and many more documents.☆15Jan 23, 2024Updated 2 years ago
- A python implementation of the signature scheme Falcon☆193Jan 13, 2026Updated 3 months ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- ☆12Jan 5, 2022Updated 4 years ago
- Verifiable FHE with GKR☆27Oct 5, 2024Updated last year
- ☆16Apr 8, 2026Updated 3 weeks ago
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆36Apr 19, 2026Updated 2 weeks ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆53Oct 31, 2025Updated 6 months ago
- A 3D printed, case for the Sofle v2.0w keyboard☆16Jul 22, 2023Updated 2 years ago
- High level wrapper over OpenCL☆21Feb 11, 2019Updated 7 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Sep 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 9 months ago
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆28Nov 7, 2023Updated 2 years ago
- Falcon Image Vulnerability Analysis (IVAN) is a command-line image assessment tool.☆24Aug 25, 2025Updated 8 months ago
- This is the C implementation of the McEliece Cryptosystem based on QC-MDPC codes.☆25Mar 25, 2021Updated 5 years ago
- Nim library for Filesystem in userspace (FUSE)☆23Jan 26, 2021Updated 5 years ago
- List of crackpot 'scientists' and 'thinkers'☆23Jun 22, 2025Updated 10 months ago
- Elliptic curve operations written in rust.☆12Jul 16, 2024Updated last year