Lecture notes on the Foundations of Isogeny-based Cryptography
☆33Sep 5, 2024Updated last year
Alternatives and similar repositories for MathematicsOfIBC
Users that are interested in MathematicsOfIBC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆42May 29, 2024Updated last year
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Jul 1, 2021Updated 4 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- ☆16Jan 23, 2026Updated 2 months ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 3 months ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 5 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 8 months ago
- ☆12Nov 11, 2022Updated 3 years ago
- Official SQIsign code, version under continuous development☆53Jun 19, 2025Updated 9 months ago
- CryptoBib BibTex files☆63Feb 26, 2026Updated 3 weeks ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- ☆13Mar 12, 2026Updated last week
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆26Jun 24, 2023Updated 2 years ago
- The instance generator of the Vision and Rescue block ciphers.☆17Mar 4, 2022Updated 4 years ago
- ☆14May 3, 2019Updated 6 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Rust library for isogeny-based cryptography☆22Updated this week
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- ☆46Feb 28, 2023Updated 3 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago