pornin / ntrugenLinks
☆22Updated 5 months ago
Alternatives and similar repositories for ntrugen
Users that are interested in ntrugen are comparing it to the libraries listed below
Sorting:
- MLKEM implementation optimized for embedded microcontrollers☆26Updated 2 weeks ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆59Updated 6 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆118Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆100Updated 2 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆118Updated 3 weeks ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- MAYO C implementation☆20Updated 8 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- ☆11Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆73Updated this week
- An Implementation of the Number Theoretic Transform☆51Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆54Updated 2 weeks ago
- Tool for generating Elliptic curve domain parameters☆130Updated last week
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated 5 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆28Updated 3 months ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆51Updated 2 years ago
- Experimental implementation of KEMTLS in Rustls☆33Updated last month
- Lattices in Cryptography (University of Michigan)☆107Updated last year
- ☆17Updated 3 years ago
- Post-quantum cryptography certificates☆75Updated last month
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆55Updated last year