newhopecrypto / newhopeLinks
Software of the NIST Post-Quantum submission NewHope
☆45Updated 5 years ago
Alternatives and similar repositories for newhope
Users that are interested in newhope are comparing it to the libraries listed below
Sorting:
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆157Updated 4 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 7 months ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆210Updated last year
- ☆52Updated 8 years ago
- Security Estimation Scripts for Kyber and Dilithium☆46Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 7 months ago
- The General Sieve Kernel☆141Updated 2 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆54Updated 3 years ago
- NTT-based Fast Lattice library☆179Updated 3 years ago
- Implementations of the NIST post-quantum cryptography process finalist NTRU.☆50Updated 3 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆82Updated 2 months ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Updated 9 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 10 months ago
- ☆100Updated 9 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆48Updated 9 years ago
- CryptoBib Database for Developers☆46Updated this week
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆53Updated 2 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 4 years ago
- An implementation of the LowMC block cipher family.☆27Updated 8 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- A list of the state of IETF protocols and PQC☆73Updated 7 months ago
- MIRACL Core☆237Updated 2 weeks ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year