SIDH C reference implementation
☆13Jan 25, 2017Updated 9 years ago
Alternatives and similar repositories for sidh-c-reference
Users that are interested in sidh-c-reference are comparing it to the libraries listed below
Sorting:
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 5 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- OCaml parsers for multiple key formats☆15Aug 1, 2024Updated last year
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- AVX-512 utilities☆20Sep 22, 2014Updated 11 years ago
- ☆15Jan 23, 2026Updated last month
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated 3 weeks ago
- Authenticated Data Structures☆16Jul 5, 2015Updated 10 years ago
- An implementation of the DudeCT constant-time function tester☆25Sep 18, 2023Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- ☆25Dec 4, 2022Updated 3 years ago
- This is only the beginning.☆19Updated this week
- some TLS utilities☆17Mar 4, 2016Updated 9 years ago
- Human-like theorem prover, inspired by robotone and developed in the Coq ecosystem.☆17May 6, 2022Updated 3 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆18Feb 22, 2021Updated 5 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Mar 18, 2025Updated 11 months ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- Handling of BER, CER, and DER encoded data in Rust.☆21Oct 31, 2025Updated 4 months ago
- OCaml-TLS exposed to C☆23Feb 27, 2018Updated 8 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆120Jul 1, 2019Updated 6 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Mar 3, 2023Updated 3 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆138Oct 25, 2019Updated 6 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- CoSi command line interface☆21Jan 23, 2017Updated 9 years ago