Performance Evaluation of SHA-256 using SHA New Instructions.
☆42May 23, 2025Updated 9 months ago
Alternatives and similar repositories for flo-shani-aesni
Users that are interested in flo-shani-aesni are comparing it to the libraries listed below
Sorting:
- Argument systems for inner pairing products☆44Jul 31, 2024Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Dec 8, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆31Mar 10, 2025Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- BLST-Verification☆23Jan 22, 2026Updated last month
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆19May 5, 2020Updated 5 years ago
- ☆21Jun 28, 2022Updated 3 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- SIPP(Statistically sound Inner Pairing Product) verification in SNARK☆17Oct 8, 2023Updated 2 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- ☆20Sep 30, 2022Updated 3 years ago
- Implementation of the SHA-3 family using AVX/AVX2 instructions.☆14Oct 5, 2018Updated 7 years ago
- ☆22Dec 19, 2024Updated last year
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- A Solidity implementation of Halo2's Pasta curves☆50Mar 30, 2023Updated 2 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- ☆15May 27, 2021Updated 4 years ago
- ☆15Oct 25, 2024Updated last year
- ☆28Nov 21, 2021Updated 4 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Bitcoin. Rust.☆10Feb 4, 2021Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Coda + Dekrypt: The SNARK Challenge - Reference Material☆35Mar 27, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- A library for decentralized private computation☆19Jul 21, 2021Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- An optimized sample code for SHA256 and SHA512 using C intrinsic☆20May 31, 2020Updated 5 years ago
- Blind signatures over secp256k1 elliptic curve☆17May 17, 2022Updated 3 years ago
- Delve into low-level RISC Zero machine☆30Dec 25, 2023Updated 2 years ago