C library for prototyping and experimenting with quantum-resistant cryptography
-
Updated
May 3, 2025 - C
C library for prototyping and experimenting with quantum-resistant cryptography
[unmaintenance] A experimental post-quantum cryptography library
The CEX Cryptographic library in C++
Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE", published in ACM CCS 2016, https://eprint.iacr.org/2016/659
practical quantum-secure key encapsulation from generic lattices
Pure Go implementation of the Secure Remote Password protocol (SRP-6a)
MAGMA code demonstrating the Extended Adaptive Attack on 2-SIDH
2x🔑🔑 Conceiving and Implementing 2-layer DiffieHellman key exchange.
Go fork supporting custom TLS 1.3 key exchange methods in crypto/tls
This Repository has some of the Encryption/Decryption algorithms used in Cryptography.
Javascript implementation of the JPAKE algorithm
Implementations
In this work, we will propose a secure P2P chat application in java programming language, and this system consists of a robust, fully decentralized (P2P) and end-to-end encrypted network architecture.
End-to-end encrypted chat in Python.
An implementation of improved Diffie-Hellman Key Excahange for thin clients suggested by, Hungyu Chien in his paper "A Generic Approach to Improving Diffie–Hellman Key Agreement Efficiency for Thin Clients".
Diffie Hellman Key Exchange Using Sockets in Java
Error rate calculation and security estimation
client-server chatroom using ecdsa/x25519/sha256 algorithms (CODE) [ PYTHON ]
Add a description, image, and links to the key-exchange-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the key-exchange-algorithms topic, visit your repo's landing page and select "manage topics."