A curated list of resources about post-quantum cryptography.
☆367Feb 8, 2026Updated last month
Alternatives and similar repositories for awesome-post-quantum
Users that are interested in awesome-post-quantum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust Post-Quantum cryptography☆390Dec 2, 2025Updated 3 months ago
- Deployments of fancy cryptography☆222Feb 26, 2026Updated last month
- MAYO C implementation☆26Mar 31, 2025Updated 11 months ago
- Clean, portable, tested implementations of post-quantum cryptography☆886Jan 9, 2026Updated 2 months ago
- Guidelines for low-level cryptography software☆1,200Jun 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fiat-Shamir for the masses.☆92Updated this week
- A curated list of cryptography papers, articles, tutorials and howtos.☆2,009Oct 17, 2024Updated last year
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Post-quantum cryptography certificates☆80Mar 20, 2026Updated last week
- ☆28Dec 8, 2021Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆37Feb 17, 2026Updated last month
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 6 years ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- C library for prototyping and experimenting with quantum-resistant cryptography☆2,822Mar 20, 2026Updated last week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆160Updated this week
- Wrappers around Rust's integer to check for constant-time-compatible usage☆23Mar 13, 2020Updated 6 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Feb 16, 2024Updated 2 years ago
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 3 months ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- CIRCL: Cloudflare Interoperable Reusable Cryptographic Library☆1,644Mar 1, 2026Updated 3 weeks ago
- ☆10Nov 1, 2024Updated last year
- ☆45Nov 27, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Describe elliptic curves☆35May 10, 2021Updated 4 years ago
- Open-Source Libraries for Circom by ABDK Consulting☆19Dec 22, 2019Updated 6 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Rust library for cryptographic research☆152Dec 27, 2024Updated last year
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 4 months ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- ☆19May 5, 2020Updated 5 years ago
- ☆17Aug 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Aug 23, 2023Updated 2 years ago
- Pairing-friendly elliptic curve library.☆353Apr 17, 2025Updated 11 months ago
- Experimental folding schemes library☆264Feb 23, 2026Updated last month
- ☆38Mar 20, 2017Updated 9 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Benchmark for adding Lasso lookup argument to halo2 backend☆38Mar 3, 2024Updated 2 years ago
- Source code for "Building Cryptographic Proofs from Hash Functions"☆226Dec 4, 2025Updated 3 months ago