C library for prototyping and experimenting with quantum-resistant cryptography
-
Updated
Nov 3, 2024 - C
C library for prototyping and experimenting with quantum-resistant cryptography
The CEX Cryptographic library in C++
Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE", published in ACM CCS 2016, https://eprint.iacr.org/2016/659
[unmaintenance] A experimental post-quantum cryptography library
practical quantum-secure key encapsulation from generic lattices
Implementations
MAGMA code demonstrating the Extended Adaptive Attack on 2-SIDH
Error rate calculation and security estimation
Go fork supporting custom TLS 1.3 key exchange methods in crypto/tls
Code used for demonstrating the principle of Diffie-Hellman key exchange alghorithm with AES and SHA256.
LEDAkem post-quantum key encapsulation cryptoscheme Python implementation
Compilation of all the programs I studied in Cryptography and System Security in Third Year of my Engineering
Pure Go implementation of the Secure Remote Password protocol (SRP-6a)
An implementation of improved Diffie-Hellman Key Excahange for thin clients suggested by, Hungyu Chien in his paper "A Generic Approach to Improving Diffie–Hellman Key Agreement Efficiency for Thin Clients".
This Repository has some of the Encryption/Decryption algorithms used in Cryptography.
End-to-end encrypted chat in Python.
Self-study in cryptosystems
Add a description, image, and links to the key-exchange-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the key-exchange-algorithms topic, visit your repo's landing page and select "manage topics."