mjosaarinen / py-acvp-pqcLinks
Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)
☆60Updated 7 months ago
Alternatives and similar repositories for py-acvp-pqc
Users that are interested in py-acvp-pqc are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆132Updated this week
- MLKEM implementation optimized for embedded microcontrollers☆27Updated 2 months ago
- A list of the state of IETF protocols and PQC☆73Updated 7 months ago
- ☆57Updated last year
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago
- Post-quantum cryptography certificates☆77Updated this week
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆54Updated 3 years ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆93Updated 2 months ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆120Updated last month
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆55Updated 3 weeks ago
- CryptoBib Database for Developers☆46Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- ☆52Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- Lean cryptographic library usable for bare-metal environments☆81Updated last week
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆157Updated 4 months ago
- MAYO C implementation☆21Updated 10 months ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆53Updated 2 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 10 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Crypto library☆67Updated last month
- ☆23Updated 6 months ago
- Security Estimation Scripts for Kyber and Dilithium☆46Updated 4 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago