Clean, portable, tested implementations of post-quantum cryptography
-
Updated
Apr 14, 2025 - C
Cryptographic algorithms secure against potential future quantum computers.
Clean, portable, tested implementations of post-quantum cryptography
Integration of selected post-quantum schemes into the embedded TLS library wolfSSL as part of our paper "Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3"
IAV quantumSAR - "Quantum-proof your data with our state of the art cryptographic implementation"
Lattice-based cryptography using LWE and LWR scheme
Software Authenticator using ML-DSA 44/65/87 and ES256 algorithms with CTAP and UHID implementations written Rust, using the prebuilt liboqs library written in C.
PQC (ML-KEM) TLS 1.3 reversed proxy, built without high-level TLS libraries. Ideal for security research & protocol analysis.
A side-channel resistant implementation of the HQC Post-Quantum Cryptosystem for the "Cryptography and Architectures for Computer Security" course at Politecnico di Milano (A.Y. 2020/2021)
j-hpn-ssh: A development fork of the Pittsburgh Super-computing Center's High Performance SSH implementation.
SABER is the 3rd round lattice-based candidate algorithm in the standardization process initiated for NIST public-key cryptosystems. This repository is the PAKE version of Saber.
"First demonstration of a post-quantum key-exchange with a nanosatellite" (Source Code)
Some samples that provide 5G networks solution developers and integrators with a SUCI deconcealment function implemented in a Luna HSM using PQC.
General Kyber.PAKE AES (as encryption module)
Some basic PQC demos
Software Authenticator using ML-DSA 44/65/87 and ES256 algorithms with CTAP and UHID implementations written Rust, using the prebuilt liboqs library written in C.
General Kyber.PAKE AES (as encryption module)