A Python implementation of the NewHope post-quantum cryptographic scheme.
☆21Apr 3, 2022Updated 4 years ago
Alternatives and similar repositories for PyNewHope
Users that are interested in PyNewHope are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Software of the NIST Post-Quantum submission NewHope☆45Dec 13, 2020Updated 5 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 8 years ago
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 6 years ago
- ☆11Mar 19, 2023Updated 3 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Dec 13, 2023Updated 2 years ago
- ☆21May 31, 2024Updated last year
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- ☆14Dec 8, 2021Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Simple Python Ring-Learning With Errors Key Exchange☆19Jun 1, 2017Updated 8 years ago
- ☆23Jan 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Go bindings for my shamir-secret-sharing library☆18Dec 3, 2021Updated 4 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆160Sep 29, 2025Updated 6 months ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆49Aug 3, 2017Updated 8 years ago
- Gabes: Garbled Circuits in Python☆16Feb 7, 2023Updated 3 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Jul 26, 2016Updated 9 years ago
- Go implementation of ML-KEM.☆127Mar 22, 2026Updated 2 weeks ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Mar 30, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A utility for secure HTTP/Websocket port exposure☆16Feb 10, 2024Updated 2 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- ☆10Sep 10, 2025Updated 7 months ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- Examples for the HEBI Robotics Python API☆14Mar 27, 2026Updated 2 weeks ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- A performant, 100% native-julia MD5 implementation☆20Jan 5, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆12Aug 17, 2020Updated 5 years ago
- ☆36Oct 26, 2020Updated 5 years ago
- The .NET library to detect OS and process environment☆20Jan 25, 2026Updated 2 months ago
- gcnano-binaries☆11Feb 9, 2026Updated 2 months ago
- Getting Python Performance with Intel(R) Distribution for Python☆13Jan 25, 2023Updated 3 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆38Oct 12, 2017Updated 8 years ago
- ECED440 Computer Security☆11Updated this week