masksign / raccoonLinks
Raccoon Signature Scheme -- Reference Code
☆11Updated 2 years ago
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below
Sorting:
- Latex classes for IACR publications.☆13Updated last week
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated this week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 3 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Reference repository on Lattice-based Cryptography☆26Updated 11 months ago
- Experiments with Universal Composability in EasyCrypt☆39Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆11Updated 4 months ago
- ☆20Updated 6 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆36Updated 3 months ago
- SageMath library for constructing elliptic curves☆71Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆50Updated 2 years ago
- ☆18Updated 5 months ago
- ☆17Updated last month
- MAYO C implementation☆18Updated 5 months ago
- ☆18Updated 4 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated 2 years ago
- ☆10Updated last year
- Official SQIsign code, version under continuous development☆36Updated 3 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- Hashing to Elliptic Curves☆80Updated last year
- CryptoBib Database for Developers☆45Updated last week
- CryptoBib BibTex files☆61Updated last week
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- An implementation of a post quantum anonymous credential scheme☆15Updated 9 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆98Updated this week
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Formal Analysis of the PQXDH Protocol☆26Updated last year