Software optimized implementations of GIFT and GIFT-COFB
☆18Mar 29, 2022Updated 3 years ago
Alternatives and similar repositories for gift
Users that are interested in gift are comparing it to the libraries listed below
Sorting:
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- ☆12May 7, 2021Updated 4 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 weeks ago
- ☆19Jul 13, 2020Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- ☆10Aug 8, 2022Updated 3 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆30Nov 21, 2023Updated 2 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago