The pure python implement of the slh-dsa algorithm.
-
Updated
Oct 8, 2025 - Python
Cryptographic algorithms secure against potential future quantum computers.
The pure python implement of the slh-dsa algorithm.
CLI tool for signing/verifying Git commits with CRYSTALS-Dilithium.
Efficient Algorithm Level Error Detection for Number-Theoretic Transform
This repository contains the code and materials for my research project focused on Post-Quantum Cryptography (PQC) for Quantum Key Distribution (QKD).
Automated test suite to evaluate server-side implementations of Certificate Management Protocol (CMP)
This repo contains algorithms for Post Quantum Cryptography. MLKEM, MLDSA
A toy implementation of ML-KEM, aka Kyber, based on the current FIPS 203 draft
This project demonstrates how to securely encrypt packets of messages using AES-256 encryption. Keys are securely exchanged using Kyber, a post-quantum cryptographic algorithm, and authenticated using Dilithium ensuring protection against both classical and quantum attacks.
Web application demonstrating PQC using the CRYSTALS-Kyber512 KEM combined with AES-GCM for hybrid encryption.
A multi-layered, hybrid cryptographic system designed for the post-quantum era.
For Python testing NTRU / NTT Multiplication in Academia Sinica IIS.
BitMind Chain is an AI-powered Bitcoin Layer 2 DeFi and Marketplace protocol, merging advanced artificial intelligence with Web3 technology. This repository hosts the frontend application, built with React + Mantine UI, and includes: 🧠 AI NFT Marketplace – Trade tokenized datasets & AI models as NFTs ⚡ Quantum-Secure Wallet Support – Integrates
Python3 binding for crystalskyber implementation
An implementation of the IND-CCA adaptation of Loidreau's public key encryption scheme presented in Shehhi et al. (https://eprint.iacr.org/2019/1278)
Automates the secure migration of SSH keys and configurations to post-quantum cryptography (PQC) for both servers and clients.
This library helps you keep your secrets safe by storing your authentication token and encrypted backups on two separate USB drives. That way, if someone gets one drive, they still can't get everything!