microsoft / LWE_Library
Post-quantum Cryptography LWE (Learning with Errors) Library
☆55Updated last year
Related projects ⓘ
Alternatives and complementary repositories for LWE_Library
- ☆48Updated 7 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆120Updated last year
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆81Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆44Updated 7 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- Security Estimation Scripts for Kyber and Dilithium☆25Updated 3 years ago
- Patch files to allow post-quantum OQS key exchange libraries to be used with OpenSSH☆15Updated 2 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆58Updated last year
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆59Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆35Updated last month
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆9Updated last year
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆43Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Software of the NIST Post-Quantum submission NewHope☆45Updated 3 years ago
- ☆15Updated last month
- ☆32Updated 2 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆88Updated last year
- Intel® Software Guard Extensions SSL☆230Updated this week
- ☆97Updated 8 years ago
- Post-quantum cryptography certificates☆52Updated last week
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Simple Python Ring-Learning With Errors Key Exchange☆17Updated 7 years ago
- Experimental implementation of KEMTLS in Rustls☆27Updated last year