pornin / ntrugen
☆17Updated 4 months ago
Alternatives and similar repositories for ntrugen:
Users that are interested in ntrugen are comparing it to the libraries listed below
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- High-assurance, high-performance C90 implementation of ML-KEM☆28Updated this week
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆10Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆33Updated 2 weeks ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- MAYO C implementation☆13Updated this week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆63Updated 3 months ago
- ☆19Updated 5 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆24Updated 3 weeks ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆38Updated last week
- ☆22Updated 2 years ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago
- ☆12Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- An Implementation of the Number Theoretic Transform☆41Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆29Updated 5 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- ☆11Updated 3 years ago
- ☆53Updated 7 months ago
- Lean cryptographic library usable for bare-metal environments☆33Updated this week
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆91Updated last year