Isogeny-based signature using Unruh's construction and the SIDH library
☆18Mar 15, 2017Updated 9 years ago
Alternatives and similar repositories for isogenysignature
Users that are interested in isogenysignature are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Supersingular Isogeny Diffie-Hellman in Rust☆20Nov 10, 2021Updated 4 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Feb 8, 2017Updated 9 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- JavaScript wrapper for a WebAssembly build of SIDH.☆21Jul 1, 2022Updated 3 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Convert a cmi file back to an mli interface☆13Oct 4, 2012Updated 13 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Quantum implementation of elliptic curve primitives☆34May 20, 2022Updated 3 years ago
- L-system interpreter in OCaml☆21Dec 10, 2015Updated 10 years ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Jan 14, 2026Updated 2 months ago
- Elixir implementation of Shamir's Secret Sharing☆14Oct 28, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆327Mar 3, 2023Updated 3 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Apr 4, 2019Updated 6 years ago
- A fast erlang gRPC client -- with fast http/2 and long connection☆11Dec 20, 2016Updated 9 years ago
- experimenting with CRDTs in erlang☆32Mar 13, 2015Updated 11 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- iOS 8 Swift Custom Keyboard Extension☆11Mar 15, 2019Updated 7 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆11Apr 30, 2014Updated 11 years ago
- MessagePack encoder for types conforming to Swift 4's Encodable protocol☆12Jun 12, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Threshold encryption☆12Jan 18, 2022Updated 4 years ago
- Code of Round5☆11May 4, 2020Updated 5 years ago
- The Latex files used to create my PhD Thesis☆17Jul 8, 2022Updated 3 years ago
- A research project on isomorphisms of finite fields☆16Jun 15, 2018Updated 7 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- ☆28Nov 26, 2024Updated last year
- Pure Rust implementation of the post-quantum secure digital signature scheme FAEST☆17Feb 19, 2026Updated last month
- F* proofs of Ethereum☆10Sep 17, 2021Updated 4 years ago
- Pythia server (prototype) implementation☆13Nov 8, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A forward-secure append-only persistent authenticated data structure☆16Jul 5, 2016Updated 9 years ago
- A Lasp PG adapter for the Phoenix framework pubsub☆18Apr 18, 2018Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- A swift implementation of Shamir's Secret Sharing over GF(2^8)☆18Sep 28, 2022Updated 3 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Aug 28, 2021Updated 4 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Dec 3, 2018Updated 7 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago