czielinski / secmultipartycomp
Introduction to Secure Multi-Party Computations
☆16Updated 5 years ago
Related projects: ⓘ
- ☆19Updated this week
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆13Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- ☆9Updated last year
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆15Updated 7 years ago
- ☆14Updated this week
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- ☆20Updated this week
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- High Assurance Cryptographic Software☆10Updated 6 months ago
- cgo wrappers around post-quantum cryptography primitives☆22Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 6 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- a web page / paper☆18Updated 7 years ago
- Public working documents (e.g., Internet drafts)☆20Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆22Updated 9 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆19Updated 2 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- ☆22Updated 8 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Experiments in high-assurance crypto.☆46Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆14Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Updated 2 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 3 years ago