practical quantum-secure key encapsulation from generic lattices
☆31Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for frodo
Users that are interested in frodo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source files for ZKDL Lectures☆24Nov 17, 2025Updated 4 months ago
- Falcon signature and its ZKP extensions☆23Jul 5, 2022Updated 3 years ago
- implentation of Ligerito☆19Nov 9, 2025Updated 4 months ago
- A proof-of-concept implementation to evaluate a UTXO-based generalized channel construction in Bitcoin.☆13Dec 13, 2021Updated 4 years ago
- Compact tries for fixed-width keys☆26Jun 4, 2018Updated 7 years ago
- IO engine for Nim.☆10Jul 8, 2024Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- ☆23Dec 8, 2025Updated 3 months ago
- Deep Learning w/ Nim using Arraymancer☆12Mar 1, 2022Updated 4 years ago
- MAYO C implementation☆26Mar 31, 2025Updated 11 months ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆160Sep 29, 2025Updated 5 months ago
- A Nim desktop shadertoy fragment shader player☆12Sep 14, 2024Updated last year
- Binary Editor☆22Jul 17, 2025Updated 8 months ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- Adaptive Neuro-Symbolic Network Agent☆14Oct 11, 2018Updated 7 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 6 months ago
- Artifact associated with CHES 2022 paper https://tches.iacr.org/index.php/TCHES/article/view/9817☆12Nov 10, 2023Updated 2 years ago
- Kryten is a CLI tool to ask questions and get sourced answers from any .pdf, .doc, .docx, and many more documents.☆15Jan 23, 2024Updated 2 years ago
- ☆28Apr 6, 2022Updated 3 years ago
- A python implementation of the signature scheme Falcon☆191Jan 13, 2026Updated 2 months ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Verifiable FHE with GKR☆27Oct 5, 2024Updated last year
- ☆16Mar 6, 2026Updated 2 weeks ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆53Oct 31, 2025Updated 4 months ago
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆30Updated this week
- qTESLA Library, an optimized implementation of the post-quantum lattice-based digital signature scheme qTESLA.☆26Aug 31, 2022Updated 3 years ago
- A 3D printed, case for the Sofle v2.0w keyboard☆15Jul 22, 2023Updated 2 years ago
- High level wrapper over OpenCL☆21Feb 11, 2019Updated 7 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Sep 3, 2020Updated 5 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 8 months ago
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆28Nov 7, 2023Updated 2 years ago
- Falcon Image Vulnerability Analysis (IVAN) is a command-line image assessment tool.☆24Aug 25, 2025Updated 6 months ago
- Nim library for Filesystem in userspace (FUSE)☆23Jan 26, 2021Updated 5 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Jun 22, 2025Updated 9 months ago
- Elliptic curve operations written in rust.☆13Jul 16, 2024Updated last year