Latex classes for IACR publications.
☆15Feb 26, 2026Updated last week
Alternatives and similar repositories for latex
Users that are interested in latex are comparing it to the libraries listed below
Sorting:
- Initial Rust implementation of FAEST☆14Jul 6, 2023Updated 2 years ago
- Noir support for Zed☆11May 3, 2024Updated last year
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- A proof-of-concept implementation of KiloNova☆12Oct 15, 2024Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Jun 7, 2024Updated last year
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- An arkworks implementation of the superspartan PIOP☆13Sep 10, 2024Updated last year
- Plonkish Nova implementation along with advanced features☆16Dec 16, 2023Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- Formal verification of the zkWasm project☆17Aug 13, 2024Updated last year
- Empirical Study of the Prominence of Zero-Knowledge Proof (ZKP) Languages☆22Aug 6, 2025Updated 7 months ago
- Go implementation of Merkle Tree Certificates☆25Nov 5, 2025Updated 4 months ago
- Rust crypto library for zero-knowledge proofs☆20Jan 14, 2026Updated last month
- A collection of awesome Miden links, resources and shiny things.☆18Jun 12, 2025Updated 8 months ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Mar 18, 2025Updated 11 months ago
- MacTok is a research prototype for a one-time anonymous token scheme based on algebraic MACs.☆23Jan 20, 2023Updated 3 years ago
- ☆24Dec 21, 2024Updated last year
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Jul 18, 2025Updated 7 months ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- ☆23Mar 8, 2024Updated last year
- ☆32Feb 14, 2026Updated 2 weeks ago
- Types of information in the world that are digitally signed, along with projects that use zk proofs over these signatures☆27Feb 5, 2024Updated 2 years ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Jun 27, 2023Updated 2 years ago
- A list of the state of IETF protocols and PQC☆76Jun 26, 2025Updated 8 months ago
- Template repository for a CG proposal or work item.☆17Aug 30, 2024Updated last year
- C++ library for IOP-based zkSNARKs☆176Jan 12, 2024Updated 2 years ago
- Circom arithmetic circuits and concepts explained, in depth.☆31May 26, 2025Updated 9 months ago
- ☆30Sep 19, 2022Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Jan 17, 2018Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Fiat-Shamir for the masses.☆89Feb 14, 2026Updated 2 weeks ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- Hyper-parallel ZK coprocessing.☆17Aug 29, 2025Updated 6 months ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated 10 months ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- A Rust-based, bare-metal kernel implementing zero-trust execution, cryptographic self-measurement and capability-enforced isolation for N…☆38Feb 23, 2026Updated last week
- Implementation of the Idemix attribute based credential scheme used in IRMA☆11Dec 11, 2024Updated last year
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago