masksign / raccoon
Raccoon Signature Scheme -- Reference Code
☆10Updated last year
Related projects: ⓘ
- Lecture notes on the Foundations of Isogeny-based Cryptography☆27Updated 2 weeks ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆26Updated last year
- Experiments with Universal Composability in EasyCrypt☆30Updated this week
- ☆17Updated 5 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- An implementation of the LowMC block cipher family.☆24Updated 6 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆17Updated 2 years ago
- CryptoBib Database for Developers☆40Updated last week
- Reference repository on Lattice-based Cryptography☆22Updated 2 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆21Updated 2 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆18Updated 3 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago
- ☆18Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆47Updated 2 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆48Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆14Updated last week
- Crypto library☆50Updated last month
- Circuits for functions of interest to cryptography☆27Updated 7 months ago
- CryptoBib Main Repository for Developers☆18Updated 3 weeks ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆38Updated 3 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 2 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆27Updated last month
- ☆32Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆55Updated 2 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 3 years ago
- ☆13Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆37Updated last year