ruandc / Ring-LWE-Encryption
☆49Updated 7 years ago
Alternatives and similar repositories for Ring-LWE-Encryption:
Users that are interested in Ring-LWE-Encryption are comparing it to the libraries listed below
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 9 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated 2 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- Security Estimation Scripts for Kyber and Dilithium☆34Updated 4 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆45Updated 7 years ago
- XPIR: Private Information Retrieval for Everyone☆117Updated 3 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- NTT-based Fast Lattice library☆169Updated 2 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆35Updated last month
- A bitsliced implementation of ECB and CTR AES☆49Updated 7 months ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- ☆26Updated 6 years ago
- A C++ implementation of the DUPLO cryptographic protocol☆22Updated 7 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆24Updated 6 years ago
- CryptoBib Database for Developers☆43Updated 2 months ago
- ☆98Updated 8 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- High-assurance, high-performance C90 implementation of ML-KEM☆47Updated this week
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆130Updated 3 months ago
- ☆32Updated 3 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆19Updated 7 years ago
- Lattice reduction technique☆10Updated 10 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 7 months ago