slh-dsa / slothLinks
SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator
☆39Updated 9 months ago
Alternatives and similar repositories for sloth
Users that are interested in sloth are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆123Updated last week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 6 months ago
- Crypto library☆67Updated last month
- Fast constant-time AES implementations on 32-bit architectures☆68Updated last year
- Lean cryptographic library usable for bare-metal environments☆81Updated this week
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- MAYO C implementation☆21Updated 9 months ago
- MLKEM implementation optimized for embedded microcontrollers☆26Updated last month
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆37Updated 2 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆385Updated this week
- ☆57Updated last year
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated last month
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- ☆24Updated 3 years ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆91Updated 2 months ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆206Updated last year
- ☆38Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Repository for the current status of the LESS submission☆13Updated last week
- SABER is a Module-LWR based KEM submitted to NIST☆53Updated 3 years ago
- ☆29Updated last year
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆82Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- ☆12Updated 2 years ago
- An Implementation of the Number Theoretic Transform☆51Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆156Updated 3 months ago