Implementation of Post-quantum cryptography signature protocol
-
Updated
Apr 27, 2024 - Python
Cryptographic algorithms secure against potential future quantum computers.
Implementation of Post-quantum cryptography signature protocol
Attack On Shortest Vector Problem of Post-Quantum Cryptography Using ML(KNN)
Manage backend accounts authentication and password with Python REST API
For Python testing NTRU / NTT Multiplication in Academia Sinica IIS.
signature schemes in python
Files related to the master's thesis on the transition to quantum-safe authentication in TLS 1.3
Lattice based cryptography research (Just personal research, please dont use it in production)
Implementation of Masked torsion point Supersingular Isogeny Diffie-Hellman (M-SIDH) key exchange
Post-Quantum Signature Mini Program derives SPHINCS+ private keys from parameters such as password, namespace, and counter. With your password, namespace, and counter, you can sign your files anywhere. Based on the PySPX library.
A toy implementation of ML-KEM, aka Kyber, based on the current FIPS 203 draft
Unbreakable encryption combination [ Binary Shuffle | reverse-bits | bit-padding | byte-to-decimal | decimal-to-byte ]
Secure Messaging with Kyber and AES-256, ensures that the encrypted messages are protected against both classical and quantum attacks.
An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
Python implementation of the quantum-resistant Supersingular Isogeny Diffie-Hellman key exchange
LEDAkem post-quantum key encapsulation cryptoscheme Python implementation
Make Post-Quantum File Signatures
A python package for post-quantum-safe transaction on Web3 with hybrid key encapsulation methods.
Ancillary files for research done on a variant of the Winternitz one-time signature scheme.
The code for a thesis project done spring 2024 at LTH.