IAIK / fish-begol
Implementation of the Fish and Begol signature schemes
☆13Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for fish-begol
- Banquet implementation☆13Updated 2 years ago
- This software library is a C-language + optimized assembly code that supports an instance of the Super-Singular Isogeny Diffie-Hellman (S…☆9Updated 6 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- ☆50Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago
- Implementation of the ZKB++ proof system☆20Updated 5 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- BLS working standard draft☆39Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- Implementation of the Groth16 zk-SNARK proving system☆22Updated 6 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆25Updated 5 months ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆35Updated 6 years ago
- Toolbox for Automatic Secure Two-partY computation☆10Updated 8 years ago
- distributed RSA modulus generation in Rust☆15Updated 2 years ago
- An implementation of the LowMC block cipher family.☆25Updated 6 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- ☆18Updated 3 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 3 years ago
- Super Amazing Universal Composability, Yeah!☆33Updated 2 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆81Updated 2 years ago
- ☆22Updated 8 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- ☆9Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 2 months ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- Notes on cryptographic schemes and attacks☆25Updated 5 years ago
- A zk-SNARK for randomized algorithms + linear-size universal circuits☆17Updated 3 years ago