post-quantum-cryptography / post-quantum-state-leakage-secure-akeLinks
☆11Updated 2 years ago
Alternatives and similar repositories for post-quantum-state-leakage-secure-ake
Users that are interested in post-quantum-state-leakage-secure-ake are comparing it to the libraries listed below
Sorting:
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆59Updated 5 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Post-quantum cryptography certificates☆74Updated 3 weeks ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆154Updated 2 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆117Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- Circuits for functions of interest to cryptography☆28Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Crypto library☆66Updated 2 weeks ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 2 years ago
- MAYO C implementation☆20Updated 8 months ago
- ☆38Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollers☆26Updated last week
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cry…☆119Updated 6 months ago
- Experimental implementation of KEMTLS in Rustls☆33Updated last month
- ☆23Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆64Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Updated 2 weeks ago
- A curated list of resources about post-quantum cryptography.☆346Updated 3 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆55Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Updated 3 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 6 years ago