-
Project Name: oqsprovider - (Open Quantum Safe provider for OpenSSL3.x )
Github URL: https://github.com/open-quantum-safe/oqs-provider
Issue tracker: https://github.com/open-quantum-safe/oqs-provi…
-
Thanks for pointing out the new/3.4.0 encap/decap feature, @beldmit . Worth while adding a comment at https://github.com/open-quantum-safe/oqs-provider?tab=readme-ov-file#note-on-openssl-versions and …
-
Upstreams cease(d) to support Kyber in favour of ML-KEM. OQS not following suit entails additional and constantly growing effort. See also https://github.com/open-quantum-safe/liboqs/pull/1914#issueco…
-
There is a lot of talk about Post-Quantum / Quantum-Resistant Cryptography, and leadership at a company I am talking with has asked about a proof-of-concept for a PKI that uses Post Quantum algorithms…
-
> That file represents the state of the access as configured in GitHub at the time I created it. If it does not represent the community, or the decisions made therein, please file an issue to docume…
-
**Describe the feature request**
We would like to enable Istio's mesh mTLS communication to be secured using quantum-safe curves supported by Envoy (`X25519Kyber768Draft00`) today.
This require…
-
`oqsprovider` (and suitably limited `liboqs` configs) may be (are?) being used in settings considered "productive" despite a [documented (standard) warning against this](https://github.com/open-quantu…
-
Hello,
Some PRs introduced `OQS_USE_PTHREADS ` flag to decide if to use pthreads or not, however seems that this does not have an effect.
The library always links against pthread.
The flag is…
-
The [openssf best practices badge](https://www.bestpractices.dev/en) can demonstrate a project follows best practice.
I propose we consider this at an appropriate time for our PQCA projects (I went t…
-
https://github.com/open-quantum-safe/liboqs/pull/1585 updates HQC to the 2023-04-30 (currently latest) version, but it only includes a "clean" portable C implementation. An optimized AVX2 implementati…