A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 cases
☆36May 30, 2018Updated 7 years ago
Alternatives and similar repositories for ringlwe
Users that are interested in ringlwe are comparing it to the libraries listed below
Sorting:
- Software of the NIST Post-Quantum submission NewHope☆45Dec 13, 2020Updated 5 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Apr 12, 2019Updated 6 years ago
- Interactive proof-of-concept of the Dual_EC_DRBG backdoor☆20Sep 8, 2022Updated 3 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Apr 15, 2020Updated 5 years ago
- Simple Python Ring-Learning With Errors Key Exchange☆18Jun 1, 2017Updated 8 years ago
- A python implementation of Leighton-Micali hierarchical hash based signatures☆19Feb 25, 2017Updated 9 years ago
- Unicorn CPU emulator framework tutorial☆22Apr 5, 2021Updated 4 years ago
- Build your AI agent in few clicks☆13Oct 28, 2025Updated 4 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Jan 17, 2018Updated 8 years ago
- Genetic program repair using GHC☆33May 16, 2024Updated last year
- Minimal CPU Emulator Powered by the ARM PL080 DMA Controller☆36Jul 25, 2024Updated last year
- A toy code generator (i.e. "program synthesis") using the Z3 solver☆35Nov 13, 2017Updated 8 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 2 years ago
- cheap and terrible voltage glitcher hardware/software☆42Jan 1, 2020Updated 6 years ago
- Scripts para configurar servidor de DNS nos vários sistemas operativos☆11Jan 6, 2016Updated 10 years ago
- An OpenAL debugging tool.☆10Aug 31, 2021Updated 4 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- Nightly builds of NSA's Ghidra☆41Feb 23, 2026Updated last week
- Code of Round5☆11May 4, 2020Updated 5 years ago
- Flow-based programming framework☆15Apr 9, 2018Updated 7 years ago
- ☆12Nov 22, 2024Updated last year
- ☆14Oct 6, 2023Updated 2 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- Generalized Optimal Transport Attention with Trainable Priors☆24Jan 25, 2026Updated last month
- Lightweight cryptography☆14Nov 7, 2022Updated 3 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- ☆1,160Feb 16, 2025Updated last year
- ☆10Aug 25, 2020Updated 5 years ago
- Basic recreation of the Nier Automata tone filter in VST form☆15Oct 15, 2024Updated last year
- ☆11Aug 8, 2016Updated 9 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Official implementation for "How Should We Meta-Learn Reinforcement Learning Algorithms?"☆23Sep 7, 2025Updated 5 months ago
- A model builder helper for creating graph neural networks akin to the ones described in https://arxiv.org/abs/1806.01261 and https://ie…☆12Apr 18, 2019Updated 6 years ago
- 🗿 SAT solver wrappers for Kotlin☆11Mar 2, 2024Updated 2 years ago
- 快速开发公司/个人代码规范检查☆10May 15, 2020Updated 5 years ago
- A .NET cross-platform CLI app that uses TorSharp to run a local proxy☆12Feb 23, 2026Updated last week
- ☆14Jul 14, 2016Updated 9 years ago