Constant time big numbers for Go
☆106Feb 26, 2025Updated last year
Alternatives and similar repositories for saferith
Users that are interested in saferith are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Document mathematical Go code beautifully☆204Feb 9, 2024Updated 2 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Benchmark the init cost of Go packages☆83Sep 5, 2025Updated 6 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Elliptic Curve Cryptography Compiler: an incomplete experiment in code-generation for elliptic curves in Go☆52Dec 15, 2020Updated 5 years ago
- goff (go finite field) is a unix-like tool that generates fast field arithmetic in Go.☆76Jul 1, 2022Updated 3 years ago
- Secure your dev servers, insecurely!☆48Jan 23, 2026Updated 2 months ago
- Work space for golang.org/x/perf version 2☆20Nov 14, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- go implementation of anchorhash☆15Nov 19, 2020Updated 5 years ago
- A set of cryptographic proofs for simple protocols, to be formalised in various tools.☆23Updated this week
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- ☆18Oct 30, 2023Updated 2 years ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- A small SAT solver in Go☆23Dec 27, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- High assurance Go secp256k1 (Mirror)☆28Sep 25, 2023Updated 2 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Implementation of the FROST protocol for threshold Ed25519 signing☆75Feb 19, 2026Updated last month
- An example usage as a standalone CLI of https://github.com/KZen-networks/multi-party-ecdsa library which is a Rust implementation of {t,n…☆37Feb 18, 2026Updated last month
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last month
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Implementation of protocols for threshold signatures☆372Sep 10, 2025Updated 6 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 6 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- A scheme that produces a zero-knowledge proof of correctness for an MPC computation. The scheme allows anyone, particularly someone exter…☆26Feb 20, 2024Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 9 months ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago