easyuc / EasyUCLinks
Experiments with Universal Composability in EasyCrypt
☆42Updated 2 weeks ago
Alternatives and similar repositories for EasyUC
Users that are interested in EasyUC are comparing it to the libraries listed below
Sorting:
- Examples for EasyCrypt Lectures☆26Updated 4 months ago
- ☆54Updated this week
- CryptoBib BibTex files☆62Updated 3 weeks ago
- SageMath library for constructing elliptic curves☆73Updated 2 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 6 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆43Updated 5 years ago
- Super Amazing Universal Composability, Yeah!☆32Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Crypto library☆66Updated 3 weeks ago
- A Language and Compiler for Homomorphic Encryption Made easY☆67Updated 5 years ago
- Oblivious transfer library for rust☆11Updated 6 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆379Updated this week
- CryptoBib Database for Developers☆45Updated 3 weeks ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- ☆52Updated 2 years ago
- ☆23Updated 6 years ago
- ☆16Updated last week
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆53Updated 3 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated last month
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Global-Scale Secure Multiparty Computation☆50Updated last month
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- An implementation of the LowMC block cipher family.☆27Updated 8 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆53Updated 2 years ago
- Hashing to Elliptic Curves☆80Updated last year
- Latex classes for IACR publications.☆14Updated last week
- Formal Analysis of the PQXDH Protocol☆30Updated last year