microsoft / Picnic
Reference implementation of the Picnic post-quantum signature scheme
☆160Updated last year
Alternatives and similar repositories for Picnic:
Users that are interested in Picnic are comparing it to the libraries listed below
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆322Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆135Updated 5 months ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆83Updated 2 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- ☆97Updated 8 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- C++ library for Finite Fields and Elliptic Curves☆156Updated 3 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- MIRACL Core☆219Updated last month
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆168Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆46Updated 7 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆174Updated 5 years ago
- Implementations of the NIST post-quantum cryptography process finalist NTRU.☆46Updated 2 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆40Updated 5 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- ☆49Updated last year
- ☆134Updated 4 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆50Updated last year
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 8 years ago
- Deployments of fancy cryptography☆140Updated last week
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated last month
- NTT-based Fast Lattice library☆171Updated 2 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆45Updated 8 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago