Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
- Updated
Jun 7, 2024 - CSS
Cryptographic algorithms secure against potential future quantum computers.
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
PQC Capabilities Matrix (PQCCM)
quantum safe digital gold dust
Migros Prototype for the migration to Quantum-Safe protocols
A Camera Application for keeping your pictures Secure with a quantum twist
A quantum-resistant digital signature scheme in Python using the Rainbow cryptography scheme.
Distributed Symmetric Key Establishment (DSKE) implementation in Python and FastAPI
Analysis Framework for Migros Prototype for Quantum-Safe Protocols
Cross-Platform Post-Quantum Cryptography Binary Generator
Fork of OQS-OpenSSL 1.1.1u.
Android application benchmarking Post-Quantum Cryptography (Kyber/Dilithium) performance on mobile. Features live Bouncy Castle execution and simulates hardware vs. software acceleration metrics. Developed for CSE 535 Project 3, at ASU.
OTPs have long been identified as perfect encryption, however, they have limitations that have made them impractical. MUPs (Multiple Use Pads) are reusable OTPs that are practical and ideal. This is a basic example to demonstrate that the removal of language and plaintext patterns.
Simplified version of CRYSTALS-Kyber. It contains implementations of the main reference algorithms