Intuitive Advanced Cryptography
☆436Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
Sorting:
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- ☆15May 27, 2021Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Blind signatures over secp256k1 elliptic curve☆17May 17, 2022Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Guidelines for low-level cryptography software☆1,191Jun 11, 2023Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Dec 20, 2019Updated 6 years ago
- Encrypt messages that only members from a set of hypercores can decrypt.☆16May 22, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Rust library for cryptographic research☆152Dec 27, 2024Updated last year
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- Cryptographic Primitive Code Generation by Fiat☆807Updated this week
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 2 years ago
- Benchmarking Polynomial Commitments☆51Jul 3, 2023Updated 2 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- Crypto Audit Guidelines☆134Dec 28, 2020Updated 5 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- ☆28Jan 12, 2026Updated last month
- a sketch of what a zkvm could look like☆26Apr 19, 2021Updated 4 years ago
- C++ library for IOP-based zkSNARKs☆176Jan 12, 2024Updated 2 years ago
- Elliptic curve search experiments☆35Mar 6, 2023Updated 2 years ago
- Cryptographic protocols☆38Apr 19, 2023Updated 2 years ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆70Mar 5, 2023Updated 2 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆16Aug 25, 2020Updated 5 years ago