Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme
☆17Feb 26, 2016Updated 10 years ago
Alternatives and similar repositories for hilabliss
Users that are interested in hilabliss are comparing it to the libraries listed below
Sorting:
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- BLISS: Bimodal Lattice Signature Schemes☆30Jul 10, 2020Updated 5 years ago
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆20Nov 3, 2015Updated 10 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Sep 23, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Practical Cryptoanalysis☆12Nov 23, 2015Updated 10 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Mar 15, 2017Updated 8 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- hyperfused client for node☆22Sep 4, 2015Updated 10 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Oct 7, 2015Updated 10 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆49Aug 3, 2017Updated 8 years ago
- Go HTTP Strict Transport Security library☆22Oct 3, 2024Updated last year
- ☆25Jul 8, 2015Updated 10 years ago
- Helpers for clearing sensitive data on the stack and heap☆53Jun 14, 2025Updated 8 months ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- ipcrypt implementation in C☆33Apr 18, 2025Updated 10 months ago
- C Implementation of NTRUEncrypt☆217Jun 7, 2021Updated 4 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Feb 2, 2017Updated 9 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 9 months ago
- FUSION is an open-source project aimed at revolutionizing networking through the simulation of advanced SD-EONs and AI-enhanced networks,…☆13Updated this week
- ☆12Jul 23, 2024Updated last year
- Some iOS tools and scripts from 2014 for iOS reversing.☆34Jan 1, 2017Updated 9 years ago
- Optimized implementation of the Picnic signature scheme☆83Sep 2, 2022Updated 3 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Nov 18, 2023Updated 2 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Function tracer for gcc☆35Feb 1, 2017Updated 9 years ago
- Experiments in homomorphic encryption☆31Mar 13, 2015Updated 10 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆34Feb 13, 2016Updated 10 years ago