asanso / CryptoWithSageMathLinks
Cryptography in SageMath.
☆10Updated 7 years ago
Alternatives and similar repositories for CryptoWithSageMath
Users that are interested in CryptoWithSageMath are comparing it to the libraries listed below
Sorting:
- Notes on cryptographic schemes and attacks☆25Updated 7 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- fft impl for ff::Field☆17Updated last year
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Argument systems for inner pairing products☆43Updated last year
- A minimal RedJubjub implementation for use in Zebra.☆30Updated last month
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆60Updated 2 years ago
- Reference repository on Lattice-based Cryptography☆26Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- toy implementation of bfv in rust☆27Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆49Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 4 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- High Assurance Cryptographic Software☆10Updated 2 weeks ago
- Finite Fields and Curves in Lean☆14Updated 2 years ago
- BLST-Verification☆23Updated 11 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- Curve ecGFp5☆69Updated 3 years ago
- Rust encryption library for practical time-lock encryption.☆37Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆64Updated last year
- ☆19Updated last month
- ☆44Updated 2 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆37Updated 9 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- ☆22Updated last year
- math notes under one roof☆32Updated 3 weeks ago
- Falcon signature and its ZKP extensions☆23Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Updated 5 years ago