paulehoffman / post-quantum-for-engineers
☆11Updated last year
Alternatives and similar repositories for post-quantum-for-engineers:
Users that are interested in post-quantum-for-engineers are comparing it to the libraries listed below
- A list of the state of IETF protocols and PQC☆48Updated this week
- ☆14Updated 2 weeks ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- CryptoBib Main Repository for Developers☆18Updated 4 months ago
- High-assurance, high-performance C90 implementation of ML-KEM☆27Updated this week
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Post-quantum cryptography certificates☆58Updated last week
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆29Updated 5 months ago
- A repository of tools for verifying constant-timeness☆13Updated last month
- ☆32Updated 3 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆24Updated last week
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 7 months ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 8 years ago
- Experiments with Universal Composability in EasyCrypt☆32Updated this week
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated 2 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- ☆52Updated 6 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆13Updated last month
- Code and data for benchmarking post-quantum cryptography in TLS 1.3☆18Updated 3 years ago
- Reference repository on Lattice-based Cryptography☆23Updated 2 months ago
- ☆35Updated 7 years ago