tireddy2 / pqc-for-engineersLinks
☆17Updated 2 months ago
Alternatives and similar repositories for pqc-for-engineers
Users that are interested in pqc-for-engineers are comparing it to the libraries listed below
Sorting:
- Formal Analysis of the PQXDH Protocol☆29Updated last year
- Post-quantum Wireguard (Theory)☆11Updated 5 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 5 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 3 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆42Updated this week
- Hybrid Public Key Encryption☆51Updated last year
- Official SQISignHD code, version under continuous development.☆12Updated 4 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- High Assurance Cryptographic Software☆10Updated last week
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated last week
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Updated last year
- ☆14Updated 7 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Latex classes for IACR publications.☆14Updated last month
- ☆17Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆33Updated last week
- Post-quantum cryptography certificates☆74Updated last week
- ☆18Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆16Updated 11 months ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- Banquet implementation☆14Updated 3 years ago
- Hashing to Elliptic Curves☆80Updated last year
- MAYO C implementation☆19Updated 7 months ago