Experiments with Universal Composability in EasyCrypt
☆45Apr 29, 2026Updated this week
Alternatives and similar repositories for EasyUC
Users that are interested in EasyUC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Examples for EasyCrypt Lectures☆29Jan 28, 2026Updated 3 months ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Mar 25, 2026Updated last month
- EasyCrypt: Computer-Aided Cryptographic Proofs☆386Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆27Sep 25, 2023Updated 2 years ago
- ☆12Nov 11, 2022Updated 3 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆55Oct 2, 2025Updated 6 months ago
- Formalizing Polynomial Commitment Schemes in the Interactive Theorem Prover Isabelle.☆10Apr 20, 2026Updated last week
- JavaScript implementation of garbled gates and 2PC boolean circuit protocols☆21Aug 8, 2022Updated 3 years ago
- This library is archived; see crypto-primities for the latest version of this code☆21Feb 15, 2023Updated 3 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- A foundational framework for modular cryptographic proofs in Coq☆82Apr 23, 2026Updated last week
- Fluorite: Apache Calcite trace analyzer☆12Apr 15, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆21Dec 16, 2022Updated 3 years ago
- ☆17Aug 26, 2025Updated 8 months ago
- Implementation of the ZKB++ proof system☆20May 28, 2019Updated 6 years ago
- [wip] implementing origami VDF☆13Mar 1, 2023Updated 3 years ago
- Proof assistant for qRHL☆23Apr 9, 2026Updated 3 weeks ago
- A formal verification of Linear PCP SNARKs.☆61Jul 20, 2024Updated last year
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- ☆49Feb 20, 2025Updated last year
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool for verifying transitions in cryptographic game-hopping proofs☆20Updated this week
- ☆12Aug 29, 2020Updated 5 years ago
- Pythonic Web3 Multicall☆21Updated this week
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆14Aug 11, 2025Updated 8 months ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆67Mar 26, 2026Updated last month
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 4 months ago
- Language for high-assurance and high-speed cryptography☆352Updated this week
- Cryptography in SageMath.☆10Dec 17, 2018Updated 7 years ago
- Curve ecGFp5☆70Mar 31, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Zig implementation of EdDSA signatures with blind keys.☆17Apr 11, 2026Updated 3 weeks ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Apr 15, 2026Updated 2 weeks ago
- ☆35Oct 7, 2025Updated 6 months ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- Supersingular-isogeny key encapsulation (SIKE) over P434 in 6502/6510 assembly for Commodore 64☆25Feb 28, 2020Updated 6 years ago
- A map of relationships among cryptographic primitives☆12Dec 17, 2018Updated 7 years ago