microsoft / Picnic
Reference implementation of the Picnic post-quantum signature scheme
☆160Updated last year
Alternatives and similar repositories for Picnic:
Users that are interested in Picnic are comparing it to the libraries listed below
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆129Updated 2 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆323Updated last year
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- NTT-based Fast Lattice library☆168Updated 2 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆60Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- ☆97Updated 8 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆150Updated 10 months ago
- MIRACL Core☆216Updated last month
- Hashing to Elliptic Curves☆81Updated 5 months ago
- C++ library for Finite Fields and Elliptic Curves☆154Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- The Pairing-based Crypto library☆245Updated 11 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- ☆49Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆182Updated last year
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆45Updated 7 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆29Updated 6 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Implementations of the NIST post-quantum cryptography process finalist NTRU.☆43Updated 2 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆61Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- A memory-hard password hashing function.☆68Updated last year
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated 10 months ago
- ☆32Updated 3 years ago