mgoffin / keccak-python
☆12Updated this week
Related projects: ⓘ
- Automated Cryptographic Transformations☆27Updated 3 years ago
- A cryptographic method that defends against side-channel attacks☆24Updated 7 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆43Updated 9 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- 👥 A Python post-quantum cryptography library☆63Updated 8 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 2 years ago
- ☆62Updated this week
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- ☆26Updated 6 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆26Updated 7 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆65Updated last year
- ☆97Updated 8 years ago
- Optimized implementation of ring-TESLA☆11Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem i…☆9Updated 8 years ago
- Pure Python SSL, TLS and DTLS library☆35Updated 6 years ago
- ☆16Updated 10 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆62Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Analysis and generation of substitutions☆21Updated 2 years ago
- Implementation of Kravatte Encryption Suite☆15Updated 5 years ago
- ☆24Updated 2 years ago
- The public repository of the Loopix mix system☆68Updated 7 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Solve discrete logarithm problems by the number field sieve method.☆16Updated 7 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆43Updated 7 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- An Nvidia-based miner for the Protoshares (PTS) cryptocurrency☆39Updated 10 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆21Updated 8 years ago