symbolicsoft / kyber-k2soView external linksLinks
Go implementation of ML-KEM.
☆126Dec 21, 2025Updated last month
Alternatives and similar repositories for kyber-k2so
Users that are interested in kyber-k2so are comparing it to the libraries listed below
Sorting:
- Pure Java implementation of the Kyber (version 3) post-quantum IND-CCA2 KEM.☆65Jan 19, 2024Updated 2 years ago
- Implementation in Go of the post-quantum algorithms CRYSTALS-Kyber and -Dilithium☆82Jan 16, 2024Updated 2 years ago
- ☆1,157Feb 16, 2025Updated last year
- CIRCL: Cloudflare Interoperable Reusable Cryptographic Library☆1,618Jan 23, 2026Updated 3 weeks ago
- Rust Post-Quantum cryptography☆381Dec 2, 2025Updated 2 months ago
- ☆22Dec 19, 2024Updated last year
- Advanced crypto library for the Go language☆689Updated this week
- CRYSTALS-Kyber (PQC KEM) in pure python☆58Jan 21, 2025Updated last year
- filippo.io/edwards25519 — A safer, faster, and more powerful low-level edwards25519 Go implementation.☆173Feb 11, 2025Updated last year
- Community edition of Nightfall_4☆15Feb 4, 2026Updated last week
- A cutting-edge zkWASM implementation leveraging Nova-NIVC-based folding techniques.☆41Oct 28, 2025Updated 3 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated last month
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆14Apr 14, 2025Updated 10 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Sphincs+ implementation which uses minimal RAM☆13Aug 31, 2023Updated 2 years ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- A rust implementation of the Kyber post-quantum KEM☆230Mar 20, 2024Updated last year
- Study on lexibank data (presenting the lexibank dataset).☆15Apr 11, 2025Updated 10 months ago
- Designatived verifier Schnorr signatures☆13Nov 4, 2022Updated 3 years ago
- Tracking events, CfPs, abstracts, slides, and all other even related things☆22Oct 4, 2019Updated 6 years ago
- Yescrypt Hash Cracker☆14Jan 13, 2026Updated last month
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- ☆11Mar 19, 2023Updated 2 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Sep 5, 2024Updated last year
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- A Rust library for the Groth-Sahai non-interactive witness-indistinguishable and zero-knowledge proof system☆14May 1, 2025Updated 9 months ago
- A tool for verifying game-hopping proofs☆15Jan 13, 2026Updated last month
- nostr relays list that is generated automatically☆14Sep 3, 2025Updated 5 months ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 6 months ago
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 6 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆54Apr 11, 2024Updated last year
- FIPS-204 (ML-DSA) implementation in Go☆18Updated this week