pornin / c-fn-dsaLinks
☆11Updated last month
Alternatives and similar repositories for c-fn-dsa
Users that are interested in c-fn-dsa are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆89Updated this week
- Ascon - Lightweight Authenticated Encryption & Hashing☆212Updated 6 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆34Updated last month
- Lean cryptographic library usable for bare-metal environments☆61Updated 2 weeks ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆143Updated 8 months ago
- Module-Lattice-based Key Encapsulation Mechanism Standard by NIST i.e. FIPS 203☆99Updated 2 weeks ago
- A repository of tools for verifying constant-timeness☆18Updated 5 months ago
- ☆22Updated 3 weeks ago
- ☆62Updated last year
- ☆56Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated last month
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆47Updated last month
- MLKEM implementation optimized for embedded microcontrollers☆25Updated 11 months ago
- Raccoon Signature Scheme -- Reference Code☆10Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆324Updated last month
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 9 months ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆176Updated last year
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 4 months ago
- Code and data for benchmarking post-quantum cryptography in TLS 1.3☆20Updated 4 years ago
- Formal Analysis of the PQXDH Protocol☆26Updated last year
- Crypto library☆60Updated 2 weeks ago
- Intel Homomorphic Encryption Acceleration Library accelerates modular arithmetic operations used in homomorphic encryption by leveraging …☆239Updated last week
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆66Updated this week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆17Updated 4 months ago
- Intel’s HERACLES accelerator introduces a new set of fundamental instructions, the Polynomial Instructions Set Architecture (P-ISA) that …☆42Updated this week
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆48Updated 3 weeks ago