GaloisInc / ocelot
Oblivious transfer library for rust
☆11Updated 5 years ago
Alternatives and similar repositories for ocelot:
Users that are interested in ocelot are comparing it to the libraries listed below
- Super Amazing Universal Composability, Yeah!☆34Updated 2 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆63Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 5 years ago
- Multi-party computation utilities toolkit for rust☆16Updated 5 years ago
- BLS working standard draft☆39Updated 5 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- ☆49Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- ☆22Updated 8 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 3 years ago
- The modular protocol framework based on Universal Composability☆18Updated 4 years ago
- Accumulators and Vector Commitments☆43Updated 2 years ago
- Experiments with Universal Composability in EasyCrypt☆33Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Optimised bilinear pairings over elliptic curves☆55Updated last year
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 9 months ago
- Hashing to Elliptic Curves☆81Updated 6 months ago
- ☆18Updated 3 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 2 years ago
- SageMath library for constructing elliptic curves☆69Updated last year
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 8 years ago
- ☆78Updated 5 years ago
- Challenge Bypass using the Ristretto group☆35Updated this week
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- toy implementation of bfv in rust☆26Updated 2 years ago
- ☆115Updated 3 years ago
- Schnorr Protocol for Non-interactive Zero-Knowledge Proofs☆75Updated 5 years ago