Fast 4 way vectorized ladder for the complete set of Montgomery curves
☆11Feb 13, 2019Updated 7 years ago
Alternatives and similar repositories for montgomery4x
Users that are interested in montgomery4x are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆31Mar 10, 2025Updated last year
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆22Aug 24, 2020Updated 5 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Apr 4, 2019Updated 6 years ago
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- A TypeScript Attester using Turnstile for the Privacy Pass Authentication Protocol☆14Mar 19, 2026Updated last week
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Pairing-friendly elliptic curve library☆10Sep 4, 2022Updated 3 years ago
- A very small SM2 implementation for 8-bit microcontrollers☆38Mar 13, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Implementation of the SHA-3 family using AVX/AVX2 instructions.☆14Oct 5, 2018Updated 7 years ago
- A TypeScript Library for Blind RSA Signature protocol☆32Mar 23, 2026Updated last week
- A depth-aware secure computation compiler☆17Jun 7, 2025Updated 9 months ago
- This is mini rpc depend on google protobuf.☆12Jul 24, 2019Updated 6 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 5 months ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- ECIES on Twisted Edwards Curve25519 using AES-GCM and HKDF-SHA256☆34Jan 1, 2025Updated last year
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 6 years ago
- Python implementation of Knuth's Dancing Links (dlx) algorithm to solve set cover. Extremely efficient at solving Sudoku and combinatoria…☆17Feb 16, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42May 23, 2025Updated 10 months ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- STM32 + Rust + RTIC embedded project☆21Jan 5, 2021Updated 5 years ago
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆22Dec 6, 2016Updated 9 years ago
- Hash chains built with BLAKE2b☆24May 8, 2024Updated last year
- A lightweight and useful config of PowerShell.☆13Feb 16, 2020Updated 6 years ago