Security Estimation Scripts for Kyber and Dilithium
☆54Mar 16, 2021Updated 5 years ago
Alternatives and similar repositories for security-estimates
Users that are interested in security-estimates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts relating to decryption failures in PQCRYPTO schemes☆11Feb 22, 2021Updated 5 years ago
- Sample implementations of the Strassen algorithm for matrix multiplication☆11Nov 26, 2023Updated 2 years ago
- ☆14Dec 8, 2021Updated 4 years ago
- ☆1,178Feb 16, 2025Updated last year
- ☆35May 26, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An attempt at a new LWE estimator☆351Updated this week
- Flexibly construct and implement attacks on Learning Parity with Noise☆11Sep 26, 2023Updated 2 years ago
- Byte-oriented AES-256 in CTR mode☆24Jul 18, 2022Updated 3 years ago
- Software of the NIST Post-Quantum submission NewHope☆45Dec 13, 2020Updated 5 years ago
- Experimental implementation of KEMTLS in Rustls☆35Nov 11, 2025Updated 5 months ago
- ☆11Mar 19, 2023Updated 3 years ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Dec 13, 2023Updated 2 years ago
- ☆19Nov 22, 2025Updated 4 months ago
- ☆39Dec 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 6 years ago
- A python implementation of Leighton-Micali hierarchical hash based signatures☆19Feb 25, 2017Updated 9 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- ☆581Oct 8, 2025Updated 6 months ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆14Jan 6, 2026Updated 3 months ago
- Hardware implementation of Saber☆10Jul 14, 2020Updated 5 years ago
- A .NET implementation of the Reed-Solomon algorithm, supporting error, erasure and errata correction☆17Mar 22, 2019Updated 7 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Python bindings for SPHINCS+☆24Sep 27, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆85Nov 18, 2025Updated 4 months ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆123Dec 17, 2025Updated 3 months ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆416Jan 6, 2026Updated 3 months ago
- An efficient lattice-based cryptographic hash function☆28Oct 18, 2016Updated 9 years ago
- zk-SNARK WASM circuit compiler☆16Jun 2, 2025Updated 10 months ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Library routines for the different pathloss model from 3GPP & ITU for IMT2020 evaluation & 5G simulation works☆17Oct 23, 2019Updated 6 years ago
- knityak code for generating art for knit scarves☆11Jun 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vectorized AVX-512 256-bit arithmetic library☆34Sep 28, 2024Updated last year
- Fast convolution algorithms with Python types☆10Nov 20, 2016Updated 9 years ago
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆73Jan 10, 2024Updated 2 years ago
- An open-source celebration of creative academics & academic creatives☆14Dec 9, 2017Updated 8 years ago
- ☆10Aug 27, 2020Updated 5 years ago
- Using folding schemes for a provable bitcoin light client☆34May 22, 2024Updated last year
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆12Updated this week