whYBeKim / Assembly-Cryptography
☆13Updated 5 months ago
Alternatives and similar repositories for Assembly-Cryptography:
Users that are interested in Assembly-Cryptography are comparing it to the libraries listed below
- ☆13Updated 8 months ago
- Saber and NTRU on M4 and AVX2☆17Updated 3 years ago
- ☆18Updated 4 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 2 months ago
- Benchmark on KPQClean☆6Updated last year
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆10Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆17Updated 7 months ago
- NEON implementation of NIST lattice-based PQC finalists☆19Updated 3 years ago
- ☆19Updated 4 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆52Updated this week
- ☆11Updated 3 years ago
- ☆8Updated 3 years ago
- Module-Lattice-based Digital Signature Standard Standard by NIST i.e. FIPS 204☆42Updated 3 weeks ago
- CUDA-accelerated Dilithium Implementation☆11Updated 6 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- ☆11Updated last year
- Scripts relating to decryption failures in PQCRYPTO schemes☆8Updated 4 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆11Updated 3 weeks ago
- Security Estimation Scripts for Kyber and Dilithium☆35Updated 4 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆82Updated last week
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Tools for studying S-boxes☆37Updated 3 weeks ago
- Post-quantum crypto library for the ARM Cortex-M4☆330Updated last month
- Hardware implementation of Saber☆8Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 3 weeks ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆40Updated 6 months ago
- ☆20Updated 6 months ago
- ☆48Updated 4 years ago
- An attempt at a new LWE estimator☆253Updated 3 weeks ago