59 results for “topic:ml-dsa”
ShangMi (SM) cipher suites for Go (Go语言商用密码软件)
Auditable & minimal JS implementation of public-key post-quantum cryptography
A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium
openhitls
Lean cryptographic library usable for bare-metal environments
PQClean for Node.js, Deno, and browsers 🔏🔑 Node.js native addon and WebAssembly implementation
NIST FIPS 204 (ML-DSA) standard compliant, C++20, fully `constexpr`, header-only library
Secure, fast, and portable C90 implementation of ML-DSA / FIPS 204
Veil is an incredibly experimental post-quantum cryptosystem for sending and receiving confidential, authentic multi-recipient messages which are indistinguishable from random noise by an attacker.
A curated list of PQC (Post Quantum Cryptography) resources
Practical framework for experimenting with PQC in security protocols using OpenSSL and other open source libraries.
Communication over untrusted networks
This repo contains a set of libraries facilitating and streamlining the integration of Module-Lattice-Based Digital Signature Standard signature scheme (a FIPS 204 Post-Quantum Cryptography suite, based on Crystals-Dilithium) into ASP.NET Core projects - both for the purposes of token signing and their validation.
PostQuantum ML-KEM, ML-DSA and SLH-DSA Algorithms in C# (FIPS 203, FIPS 204, FIPS 205)
A pure-rust no-std reasonably-constant-time stack-efficient implementation of ML-DSA-87
Post-Quantum PKI educational demos — Trust the transition to quantum-safe cryptography
oqs - A Dart FFI wrapper for liboqs, delivering post-quantum cryptographic algorithms. Supports NIST-standardized KEMs (e.g., ML-KEM) and signatures (e.g., ML-DSA), optimized for Flutter and cross-platform applications (Android, iOS, Linux, macOS, Windows). MIT Licensed.
Pure-Python ML-DSA (FIPS 204) signature verification. Python 3.8+, zero dependencies, public domain, single file, 400 lines.
Rust Bindings to PQMagic Post-quantum Cryptographic Algorithm C Library
This repository contains Known Answer Tests (KATs) for hardware implementation of ML-DSA.
Post-Quantum X.509 PKI toolkit - PQC & Hybrid Certificates in Go
Yocto/OpenEmbedded layer for post-quantum (quantum-safe) cryptography on embedded Linux (liboqs + oqs-provider) with CI/ptests on QEMU
Post Quantum encryption of data in transit at the Application layer, without extensive rewrites of existing software, allowing for PQC Keying + Signing through existing mTLS and HTTPS mechanisms, or in unsupported and challenged environments.
Protect against quantum computer attacks with NIST-standardized post-quantum cryptography. ML-KEM-768, ML-DSA-65, crypto-agility framework.
One-Time Key Post-Quantum SSH Authentication — ephemeral session keys, ML-DSA-87 master key signing, hybrid classical/PQ key exchange, and cryptographic destruction. Every connection is unique. Every key is temporary. Every session is final.
Post-quantum cryptographic library for Rust — ML-KEM, ML-DSA, hybrid schemes, and classical algorithms with unified traits
ML-DSA-65 postquantum signatures in WebAssembly
Bitcoin anchored, ML-DSA signed time authority providing monotonic, replay safe EpochTicks for consent windows, policy enforcement, runtime validation, and alignment freshness.
Pure Rust implementation of the Module-Lattice-Based Digital Signature Standard (ML-DSA)
Post-quantum folder encryption tool (ML-KEM-768 + AES-256-GCM + ML-DSA-65 + Argon2id) — FIPS 203/204 compliant