Secure, fast, and portable C90 implementation of ML-DSA / FIPS 204
☆49Updated this week
Alternatives and similar repositories for mldsa-native
Users that are interested in mldsa-native are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆143Updated this week
- ☆16Nov 18, 2025Updated 3 months ago
- A portable library implementing NIST SP 800-90A DRBGs☆18Nov 25, 2025Updated 3 months ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆13Jan 6, 2026Updated last month
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Jan 14, 2026Updated last month
- Crypto library☆67Dec 9, 2025Updated 2 months ago
- ☆12Jul 23, 2024Updated last year
- PQC Transition Tools Index☆36Jan 22, 2026Updated last month
- Programming Languages course repository☆10Mar 11, 2022Updated 3 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Updated this week
- This RocketchatApp validates uploaded images against the Microsoft PhotoDNA cloud service and quarantines those identified as child abuse…☆12Nov 17, 2025Updated 3 months ago
- Matrix Product State algorithm for computing characters of the symmetric group S_n☆11Sep 26, 2025Updated 5 months ago
- ☆15Oct 25, 2024Updated last year
- ☆13Sep 5, 2024Updated last year
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- Verifying encodings into propositional logic in Lean☆14Aug 14, 2023Updated 2 years ago
- Solutions for all programming assignments from Stanford's University Online Cryptography Course (C#)☆11Apr 12, 2015Updated 10 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆405Jan 6, 2026Updated last month
- Conceal a disk partition from Windows☆13Feb 24, 2016Updated 10 years ago
- Credential providers demo set☆15Feb 5, 2026Updated 3 weeks ago
- ☆16Jun 22, 2024Updated last year
- A toy OS for learning purposes.☆11Feb 29, 2024Updated 2 years ago
- An implementation of a general multi-layer neural network (MLP) in F#. Evaluated using data sampled from complex functions plus white noi…☆11Jun 4, 2018Updated 7 years ago
- ☆12Oct 3, 2020Updated 5 years ago
- Hardware-tailored grouping for Pauli measurements.☆13Nov 28, 2025Updated 3 months ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- ☆11Dec 3, 2020Updated 5 years ago
- A Haskell Tutorial about parsing Satellite Telemetry☆13Nov 20, 2021Updated 4 years ago
- Large-Scale Graph Inference☆12Nov 6, 2024Updated last year
- Materials for the virtual NIMBLE workshop, May 26-28, 2021. For logistical information, please look below the file listing.☆14May 28, 2021Updated 4 years ago
- ☆10Jun 14, 2020Updated 5 years ago
- C/C++ source code for Software Tools in Pascal by Kernighan and Plauger☆19Jan 20, 2020Updated 6 years ago
- Rigorous computation of the endomorphism ring of a Jacobian☆11Jul 31, 2025Updated 7 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Faceted execution in Racket☆11Sep 11, 2018Updated 7 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year