An implementation of the NTRU encryption and decryption algorithm in Python 3
☆16Sep 29, 2024Updated last year
Alternatives and similar repositories for NTRU_python
Users that are interested in NTRU_python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple python implementation of NTRUEncrypt cryptosystem☆58Dec 22, 2020Updated 5 years ago
- A Post-Quantum Encryption Algorithm☆17Jul 3, 2020Updated 5 years ago
- NTRU Python Library with Application to Encrypted Domain☆32May 20, 2025Updated 10 months ago
- ☆19Oct 20, 2025Updated 5 months ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated last year
- SB 827 means an affordable place to live could exist on every block☆11Jan 25, 2023Updated 3 years ago
- Port of Circom Sparse Merkle Tree verifier to Noir.☆14Jan 26, 2024Updated 2 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆13Apr 1, 2020Updated 5 years ago
- An erc-20 token with EIP750 style zk private transactions and a new nullifier scheme to allow partial spends☆11Apr 11, 2025Updated 11 months ago
- Example SystemVerilog UVM Environment☆10Jun 23, 2015Updated 10 years ago
- ☆30Dec 16, 2024Updated last year
- 不喜欢各厂的iot平台,可以从硬件到服务器自已做一套,完全自主可控☆15Feb 3, 2026Updated last month
- Turn ES6 code to vanilla ES5 in meteor☆14Jan 16, 2015Updated 11 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Sockets in Sails☆10Dec 12, 2014Updated 11 years ago
- Create bundles in public directory for lazy-loading components☆13Jun 2, 2015Updated 10 years ago
- ☆12Aug 3, 2021Updated 4 years ago
- The aim is to build a mobile application to carry out two-way chat over Bluetooth. This application helps users to chat via bluetooth. Ot…☆14May 20, 2022Updated 3 years ago
- ElGamal encryption/decryption Circom2 circuits on the Baby Jubjub curve with TypeScript integration for input handling, testing, and benc…☆14Sep 17, 2023Updated 2 years ago
- Generate Valid Phone Numbers With The NPA-NXX Database☆12May 13, 2023Updated 2 years ago
- HackerRank test solutions for FPGA engineer interview at Optiver☆16Jun 7, 2020Updated 5 years ago
- SW-Hackathon-2024☆37Nov 5, 2024Updated last year
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- ☆41Nov 19, 2020Updated 5 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- A mirror of the official libtasn1 repository☆16Feb 23, 2023Updated 3 years ago
- A Python implementation of the threshold variant of the Damgard-Jurik cryptosystem.☆15May 4, 2021Updated 4 years ago
- A simple proxy scraper coded in Python.☆10Feb 4, 2017Updated 9 years ago
- Create bundles for lazy-loading components, with authentication☆20Jun 2, 2015Updated 10 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- hyb: a bioinformatics pipeline for the analysis of CLASH (crosslinking, ligation and sequencing of hybrids) data☆13Jul 12, 2024Updated last year
- A Python implemented McEliece Cryptosystem☆12Apr 3, 2023Updated 2 years ago
- Pythonic library of Rewind.ai SQLite Database. Includes CLI and MCP interfaces.☆18Sep 5, 2025Updated 6 months ago
- Verilog Code for I2C Protocol☆19Nov 12, 2020Updated 5 years ago
- Nano currency (Formerly raiblocks) partial node for node.js☆20Apr 25, 2018Updated 7 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- ☆14Apr 29, 2024Updated last year