Provides common files for instances of mupq, e.g., for pqm4 and pqriscv
☆13Jan 6, 2026Updated 2 months ago
Alternatives and similar repositories for mupq
Users that are interested in mupq are comparing it to the libraries listed below
Sorting:
- ☆16Nov 18, 2025Updated 3 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 3 months ago
- ☆16Oct 29, 2023Updated 2 years ago
- MAYO C implementation☆25Mar 31, 2025Updated 11 months ago
- MLKEM implementation optimized for embedded microcontrollers☆27Dec 1, 2025Updated 3 months ago
- ☆12Sep 6, 2023Updated 2 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- ☆13Jun 12, 2024Updated last year
- Short proof-of-concepts for STM32 boards using a very minimal interface☆18Jan 29, 2018Updated 8 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated last month
- ☆25Feb 18, 2026Updated 2 weeks ago
- Repository of the WIP draft-ietf-openpgp-pqc☆21Feb 8, 2026Updated 3 weeks ago
- ☆23Jul 4, 2025Updated 8 months ago
- ☆54Feb 25, 2026Updated last week
- Saber and NTRU on M4 and AVX2☆18Jan 15, 2022Updated 4 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Oct 2, 2023Updated 2 years ago
- Lean cryptographic library usable for bare-metal environments☆84Updated this week
- Secure, fast, and portable C90 implementation of ML-DSA / FIPS 204☆51Updated this week
- Clean, portable, tested implementations of post-quantum cryptography☆874Jan 9, 2026Updated last month
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Jun 7, 2024Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Security Estimation Scripts for Kyber and Dilithium☆48Mar 16, 2021Updated 4 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆44Jan 24, 2026Updated last month
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Examples of unions, interfaces, and assertions in SystemVerilog☆13Aug 31, 2013Updated 12 years ago
- TUM EI7402 SystemC laboratory assignments☆11Aug 10, 2021Updated 4 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- Working through https://leanpub.com/optics-by-example by Chris Penner☆11Sep 9, 2021Updated 4 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆50Aug 6, 2025Updated 7 months ago
- My Emacs configuration☆13Jun 30, 2024Updated last year
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago