Intuitive Advanced Cryptography
☆436Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
Sorting:
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Sep 21, 2022Updated 3 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Encrypt messages that only members from a set of hypercores can decrypt.☆16May 22, 2019Updated 6 years ago
- Guidelines for low-level cryptography software☆1,200Jun 11, 2023Updated 2 years ago
- ☆15May 27, 2021Updated 4 years ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆70Mar 5, 2023Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Rust library for cryptographic research☆152Dec 27, 2024Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Blind signatures over secp256k1 elliptic curve☆17May 17, 2022Updated 3 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆16Aug 25, 2020Updated 5 years ago
- Cryptographic Primitive Code Generation by Fiat☆813Updated this week
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- a sketch of what a zkvm could look like☆26Apr 19, 2021Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Benchmarking Polynomial Commitments☆51Jul 3, 2023Updated 2 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- C++ library for IOP-based zkSNARKs☆176Jan 12, 2024Updated 2 years ago
- Constant time big numbers for Go☆106Feb 26, 2025Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- Elliptic curve search experiments☆35Mar 6, 2023Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- ☆28Jan 12, 2026Updated 2 months ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago