cornelltech / CS6831-Spring2019
Designing Secure Cryptography
☆21Updated 5 years ago
Alternatives and similar repositories for CS6831-Spring2019:
Users that are interested in CS6831-Spring2019 are comparing it to the libraries listed below
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆35Updated 7 years ago
- ☆32Updated 2 years ago
- ☆22Updated 8 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 4 years ago
- A minimal RedJubjub implementation for use in Zebra.☆28Updated 2 weeks ago
- BLS working standard draft☆39Updated 5 years ago
- Multi Party Key Management System (KMS) for Secp256k1 Elliptic curve based digital signatures.☆72Updated last year
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 4 years ago
- ☆22Updated 3 months ago
- FS-DKR: One Round Distributed Key Rotation☆32Updated last year
- distributed RSA modulus generation in Rust☆15Updated 3 years ago
- Argument systems for inner pairing products☆41Updated 7 months ago
- Algorand's reference implementation of bls signature scheme☆51Updated last year
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆13Updated 2 years ago
- The modular protocol framework based on Universal Composability☆18Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 5 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- Homomorphic Encryption Randomness Beacon☆13Updated 5 years ago
- ☆15Updated 3 years ago
- Couple of "nice" curves at 128-bit and 224-bit security levels☆11Updated 3 years ago
- Coded Merkle Tree☆26Updated 5 years ago
- Presentations about R1CS☆18Updated 5 years ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- ☆12Updated 4 years ago
- LaTeX beamer slides for aggregatable subvector commitments (aSVC) talk☆10Updated 4 years ago
- ☆26Updated 2 years ago
- Super Amazing Universal Composability, Yeah!☆34Updated 2 years ago