Go implementation of ML-KEM.
☆127Mar 22, 2026Updated last month
Alternatives and similar repositories for kyber-k2so
Users that are interested in kyber-k2so are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation in Go of the post-quantum algorithms CRYSTALS-Kyber and -Dilithium☆82Jan 16, 2024Updated 2 years ago
- ☆1,191Feb 16, 2025Updated last year
- JavaScript implementation of CRYSTALS-KYBER (version 3) post-quantum key exchange algorithm.☆122Mar 13, 2025Updated last year
- CRYSTALS-Kyber (PQC KEM) in pure python☆59Jan 21, 2025Updated last year
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- CIRCL: Cloudflare Interoperable Reusable Cryptographic Library☆1,659Updated this week
- A rust implementation of the Kyber post-quantum KEM☆232Mar 20, 2024Updated 2 years ago
- Advanced crypto library for the Go language☆694Apr 15, 2026Updated 3 weeks ago
- Proof of concept code for running RLWE schemes on long integer multiplier co-processors☆20Nov 26, 2021Updated 4 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Rust Post-Quantum cryptography☆397Dec 2, 2025Updated 5 months ago
- ☆14Apr 14, 2025Updated last year
- ☆22Dec 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Platform software for Trusted Computing - TPM 2.0, Certificate Authority, and Web Services required to perform Local and Remote Attestati…☆20Apr 7, 2025Updated last year
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- ☆11Mar 19, 2023Updated 3 years ago
- A rust implementation of the Sphincs+ post-quantum signature scheme☆22Jun 25, 2023Updated 2 years ago
- Designatived verifier Schnorr signatures☆13Nov 4, 2022Updated 3 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15Mar 14, 2023Updated 3 years ago
- Community edition of Nightfall_4☆18Updated this week
- ☆587Oct 8, 2025Updated 7 months ago
- ZK Benchmarking Suite☆23Mar 15, 2024Updated 2 years ago
- A set of cryptographic proofs for simple protocols, to be formalised in various tools.☆25Mar 25, 2026Updated last month
- A Python implementation of the NewHope post-quantum cryptographic scheme.☆21Apr 3, 2022Updated 4 years ago
- Go bindings for liboqs☆121Mar 10, 2026Updated last month
- ☆17Sep 22, 2016Updated 9 years ago
- A cutting-edge zkWASM implementation leveraging Nova-NIVC-based folding techniques.☆41Oct 28, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated 2 months ago
- CryptoBib BibTex files☆65Apr 22, 2026Updated 2 weeks ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Dec 13, 2023Updated 2 years ago
- Package xaes256gcm implements the XAES-256-GCM extended-nonce AEAD.☆21Aug 8, 2024Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆35Sep 5, 2024Updated last year
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Jul 1, 2021Updated 4 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆914Jan 9, 2026Updated 4 months ago