post-quantum-cryptography / KAT
☆18Updated 3 months ago
Alternatives and similar repositories for KAT:
Users that are interested in KAT are comparing it to the libraries listed below
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 8 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆17Updated this week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated this week
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- High-assurance, high-performance C90 implementation of ML-KEM☆33Updated this week
- Implementation of cryptographic primitives in Go☆12Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆35Updated 2 weeks ago
- library providing OPRF and Threshold OPRF based on libsodium☆21Updated 3 weeks ago
- ☆29Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆18Updated 6 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- MAYO C implementation☆14Updated 2 weeks ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- List of crackpot 'scientists' and 'thinkers'☆15Updated 6 months ago
- Deployments of fancy cryptography☆134Updated last month
- ☆32Updated 3 years ago
- ☆22Updated 2 years ago
- Rust library for cryptographic research☆138Updated last month
- FN-DSA (Falcon) signature scheme☆36Updated 3 weeks ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- ☆11Updated last year
- ☆16Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 6 months ago
- Bottom-up memory-safety for assembly language using symbolic execution☆13Updated 3 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Updated 2 years ago
- ☆18Updated 4 months ago
- Curve ecGFp5☆68Updated 2 years ago