pornin / ntrugenView external linksLinks
☆23Jul 4, 2025Updated 7 months ago
Alternatives and similar repositories for ntrugen
Users that are interested in ntrugen are comparing it to the libraries listed below
Sorting:
- ☆16Nov 18, 2025Updated 2 months ago
- ☆13Jun 12, 2024Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Saber and NTRU on M4 and AVX2☆18Jan 15, 2022Updated 4 years ago
- ☆15Oct 25, 2024Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆27Dec 1, 2025Updated 2 months ago
- CUDA-accelerated Dilithium Implementation☆13Sep 8, 2024Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 8 months ago
- Lean cryptographic library usable for bare-metal environments☆82Feb 9, 2026Updated last week
- ROSE-T: ROuting SEcurity Tool☆17Nov 9, 2024Updated last year
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆13Jan 6, 2026Updated last month
- Optimized implementations of the Number Theoretic Transform (NTT) algorithm for the ring R/(X^N + 1) where N=2^m.☆26Nov 23, 2021Updated 4 years ago
- ☆19Jan 25, 2021Updated 5 years ago
- ☆16Feb 10, 2021Updated 5 years ago
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆44Jan 24, 2026Updated 3 weeks ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- ☆18Updated this week
- processor for post-quantum cryptography☆17Apr 17, 2020Updated 5 years ago
- Rainbow signature system for Round THREE submission☆20Sep 24, 2020Updated 5 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Dec 17, 2025Updated 2 months ago
- ☆29Nov 10, 2024Updated last year
- Code and data for benchmarking post-quantum cryptography in TLS 1.3☆22Feb 10, 2021Updated 5 years ago
- MAYO C implementation☆22Mar 31, 2025Updated 10 months ago
- Minimal implementation of ECDH & ECDSA on NIST P-256 for 32-bit micro-controllers☆33Jun 15, 2022Updated 3 years ago
- ☆59Mar 2, 2021Updated 4 years ago
- ☆23Apr 5, 2025Updated 10 months ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- ☆12Jul 23, 2024Updated last year
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- The NIST BGP Secure Routing Extension (BGP-SRx) is an open source reference implementation and research platform for investigating emergi…☆37Sep 29, 2024Updated last year
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- EDHOC (RFC 9528): Lightweight authenticated key exchange in C for IoT and constrained devices☆14Jan 30, 2026Updated 2 weeks ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆35Jun 28, 2018Updated 7 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Feb 14, 2020Updated 6 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year