SIDH C reference implementation
☆13Jan 25, 2017Updated 9 years ago
Alternatives and similar repositories for sidh-c-reference
Users that are interested in sidh-c-reference are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 6 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 13 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆138Oct 25, 2019Updated 6 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆327Mar 3, 2023Updated 3 years ago
- OCaml parsers for multiple key formats☆15Aug 1, 2024Updated last year
- Authenticated Data Structures☆16Jul 5, 2015Updated 10 years ago
- An implementation of the DudeCT constant-time function tester☆26Mar 23, 2026Updated last month
- ☆25Dec 4, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Jun 29, 2015Updated 10 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Feb 20, 2021Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- AVX-512 utilities☆20Sep 22, 2014Updated 11 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- An implementation of a post quantum anonymous credential scheme☆15Dec 18, 2024Updated last year
- Fujisaki-Suzuki Ring Signatures in Rust☆20Feb 22, 2021Updated 5 years ago
- CoSi command line interface☆21Jan 23, 2017Updated 9 years ago
- ☆16Jan 23, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The SonarQube plugin for jQAssistant☆15Updated this week
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated 2 months ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- This is only the beginning.☆22Apr 1, 2026Updated last month
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- some TLS utilities☆17Mar 4, 2016Updated 10 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Mar 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆119Jul 1, 2019Updated 6 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆24Nov 9, 2015Updated 10 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- OCaml-TLS exposed to C☆23Feb 27, 2018Updated 8 years ago
- Handling of BER, CER, and DER encoded data in Rust.☆22Oct 31, 2025Updated 6 months ago
- Submission site for Zcash Foundation grant proposals☆25Apr 8, 2018Updated 8 years ago