whYBeKim / Assembly-CryptographyLinks
☆15Updated 10 months ago
Alternatives and similar repositories for Assembly-Cryptography
Users that are interested in Assembly-Cryptography are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆11Updated 3 months ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆105Updated 2 weeks ago
- Saber and NTRU on M4 and AVX2☆18Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollers☆25Updated last year
- Post-quantum crypto library for the ARM Cortex-M4☆368Updated 2 months ago
- CUDA-accelerated Dilithium Implementation☆12Updated last year
- Module-Lattice-based Digital Signature Standard Standard by NIST i.e. FIPS 204☆52Updated 2 months ago
- A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber☆264Updated 2 weeks ago
- ☆11Updated 3 years ago
- ☆19Updated 4 years ago
- ☆10Updated 5 years ago
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆11Updated last year
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated 2 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆49Updated 2 years ago
- NEON implementation of NIST lattice-based PQC finalists☆20Updated 3 years ago
- ☆25Updated 10 months ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 6 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆98Updated this week
- ☆12Updated last year
- ☆11Updated 3 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- Security Estimation Scripts for Kyber and Dilithium☆43Updated 4 years ago
- ☆18Updated 4 years ago
- ☆60Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- A python implementation of the signature scheme Falcon☆179Updated 11 months ago
- ☆505Updated 10 months ago
- ☆22Updated 2 months ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆36Updated 10 months ago