Go implementation of ML-KEM.
☆126Feb 24, 2026Updated last week
Alternatives and similar repositories for kyber-k2so
Users that are interested in kyber-k2so are comparing it to the libraries listed below
Sorting:
- Implementation in Go of the post-quantum algorithms CRYSTALS-Kyber and -Dilithium☆82Jan 16, 2024Updated 2 years ago
- ☆1,164Feb 16, 2025Updated last year
- CIRCL: Cloudflare Interoperable Reusable Cryptographic Library☆1,635Mar 1, 2026Updated last week
- Rust Post-Quantum cryptography☆387Dec 2, 2025Updated 3 months ago
- ZK Benchmarking Suite☆23Mar 15, 2024Updated last year
- ☆22Dec 19, 2024Updated last year
- Advanced crypto library for the Go language☆689Updated this week
- Reusable library for creating and verifying zero-knowledge range proofs and set membership proofs.☆21Mar 7, 2023Updated 3 years ago
- Community edition of Nightfall_4☆16Updated this week
- ☆14Apr 14, 2025Updated 10 months ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- A rust implementation of the Kyber post-quantum KEM☆230Mar 20, 2024Updated last year
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- cpp witness calculator for mobile and desktop for iden3 circuits☆17Aug 22, 2025Updated 6 months ago
- Tracking events, CfPs, abstracts, slides, and all other even related things☆22Oct 4, 2019Updated 6 years ago
- Study on lexibank data (presenting the lexibank dataset).☆15Apr 11, 2025Updated 10 months ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- ☆11Mar 19, 2023Updated 2 years ago
- Designatived verifier Schnorr signatures☆13Nov 4, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- ☆31Mar 2, 2026Updated last week
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 6 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 6 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Jul 1, 2021Updated 4 years ago
- nostr relays list that is generated automatically☆15Sep 3, 2025Updated 6 months ago
- A Rust library for the Groth-Sahai non-interactive witness-indistinguishable and zero-knowledge proof system☆14May 1, 2025Updated 10 months ago
- Binary or Hex to QR Code site☆13Aug 12, 2016Updated 9 years ago
- FIPS-204 (ML-DSA) implementation in Go☆18Feb 13, 2026Updated 3 weeks ago