round5 / code
Code of Round5
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for code
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆11Updated 6 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆44Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 7 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- CryptoBib Database for Developers☆40Updated 3 weeks ago
- This software library is a C-language + optimized assembly code that supports an instance of the Super-Singular Isogeny Diffie-Hellman (S…☆9Updated 6 years ago
- Optimized implementation of ring-TESLA☆11Updated 8 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆120Updated last year
- Optimized implementation of the Picnic signature scheme☆79Updated 2 years ago
- ☆50Updated last year
- lattice-based digital signature scheme qTESLA☆30Updated 5 years ago
- ☆97Updated 8 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆111Updated 5 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆43Updated 8 years ago
- ☆48Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆33Updated 6 months ago
- Finalists to the NIST lightweight cryptography competition☆37Updated 2 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆27Updated 3 months ago
- C implementation of Elligator 2 for Curve25519☆31Updated 3 years ago
- A list of the state of IETF protocols and PQC☆44Updated 5 months ago
- BLISS: Bimodal Lattice Signature Schemes☆25Updated 4 years ago