A simple, efficient and performant Go implementation of the Lean Ethereum consensus protocol
-
Updated
May 19, 2026 - Go
A simple, efficient and performant Go implementation of the Lean Ethereum consensus protocol
Tidecoin: Open Source Post-Quantum Security Bitcoin
Share files between devices. They show up as a folder on your computer.
Decentralized Quantum-resistant AI Supercomputing Network
Mini PQC Scanner is a streamlined, command-line tool that helps organizations assess their quantum readiness by scanning systems, services, and cryptographic implementations. This lightweight version focuses on core scanning functionality, making it perfect for automated assessments, CI/CD integration, and rapid security audits.
A collection of introductory and intermediate material to help the community understand the cyber security risks forecasted due to the impending development of cryptographically relevant quantum computers, and updates on industry & government highlights from Australia and internationally
Hybrid quantum-classical encryption system using BB84 protocol, AES-256, HMAC, and optional post-quantum signatures. Includes full GUI and scientific metrics logging.
अभेद्यम । Abhedyam : Superior light fast encryption in post-quantum world
Python implementation of the FALCON (Fast Fourier Lattice-based Compact Signatures over NTRU) post-quantum signature algorithm.
AI agent governance layer — sign, monitor and control every agent action. EU AI Act · ANSSI · NIST ready.
Quantum-safe by default.
BRC-8888: Bitcoin protocol for evolving AI/PQ digital objects on Ordinals. Supports tokens, NFTs, AI agents. Genesis UNQ: 21M supply, phased mints (10M @ 2100 sats, 11M @ 4200 sats), 1% protocol fee. Open-source MIT. Bounties: 0.5% fees + 100k UNQ for first integrations. https://github.com/NisetaSigosi/brc8888
C implementation of a blind signature protocol based on ZKBoo (MPC-in-the-Head), using MSS (Merkle Signature Scheme) coupled with WOTS as the underlying one-time signature (OTS).
PQCServer is a zero-knowledge post-quantum cryptography platform that lets you send encrypted messages, store files securely, and notarize documents — all using the latest NIST-standardized post-quantum algorithms. It is part of the OnionSearchEngine LLC privacy ecosystem, alongside OnionMail and OnionDrive.
Software Authenticator using ML-DSA 44/65/87 and ES256 algorithms with CTAP and UHID implementations written Rust, using the prebuilt liboqs library written in C.
Firefox addon Post-quantum encryption for Gmail, Outlook and any webmail. Uses CRYSTALS-Kyber (ML-KEM) and Dilithium (ML-DSA) — NIST FIPS 203/204. All keys stored locally. Zero telemetry.
VRIL-KEM is a post-quantum Key Encapsulation Mechanism (KEM) built on Module Learning With Errors (M-LWE). It provides a drop-in replacement for classical key exchange in any TLS, SSH, or application-layer protocol — protecting encrypted communications against both classical and quantum adversaries.
Experimental symmetric cipher construction
The day autonomous agents can produce cryptographically bound, deterministic, machine-checkable deployment certificates is the day CI/CD stops being the authority of deployment and becomes the evidence layer for proof-carrying deployment.
Production-grade post-quantum cryptography for Python. Hybrid KEM, hybrid signatures, migration tooling, protocol helpers, and a CI-ready audit scanner — all in one library.
Add a description, image, and links to the post-quantum-security topic page so that developers can more easily learn about it.
To associate your repository with the post-quantum-security topic, visit your repo's landing page and select "manage topics."