pornin / ntrugen
☆19Updated 5 months ago
Alternatives and similar repositories for ntrugen:
Users that are interested in ntrugen are comparing it to the libraries listed below
- MLKEM implementation optimized for embedded microcontrollers☆16Updated 6 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆35Updated 3 weeks ago
- High-assurance, high-performance C90 implementation of ML-KEM☆36Updated this week
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- A bitsliced implementation of ECB and CTR AES☆47Updated 7 months ago
- MAYO C implementation☆14Updated this week
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated last week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- ☆19Updated 5 years ago
- ☆11Updated 3 years ago
- ☆16Updated 3 years ago
- ☆22Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 6 months ago
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated 2 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆52Updated last week
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Tool for generating Elliptic curve domain parameters☆113Updated 3 months ago
- An Implementation of the Number Theoretic Transform☆42Updated last year
- The General Sieve Kernel☆106Updated 2 months ago
- Differential Address Trace Analysis☆55Updated 11 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 9 years ago