Repo for the implementation of the isogeny based signature scheme CSI-FiSh
☆26Jun 24, 2023Updated 2 years ago
Alternatives and similar repositories for CSI-FiSh
Users that are interested in CSI-FiSh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆42May 29, 2024Updated last year
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 5 years ago
- Python implementation of the Gram-Schmidt and Lenstra–Lenstra–Lovász lattice basis reduction algorithms☆16Sep 23, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- ☆17Mar 11, 2026Updated 2 weeks ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- ☆13Mar 12, 2026Updated 2 weeks ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- ☆14May 3, 2019Updated 6 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- ☆25Aug 9, 2022Updated 3 years ago
- CryptoBib BibTex files☆63Feb 26, 2026Updated last month
- A minimal RedJubjub implementation for use in Zebra.☆30Mar 19, 2026Updated last week
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Designing Secure Cryptography☆22May 20, 2019Updated 6 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- ☆58Mar 6, 2017Updated 9 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- C++ library for IOP-based zkSNARKs☆177Jan 12, 2024Updated 2 years ago
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- A pure-Rust implementation of Curve41417☆16Aug 28, 2015Updated 10 years ago