fangpenlin / elliptic-curve-explainedView external linksLinks
Jupyter notebook for explaining elliptic curve encryption
☆88Mar 2, 2021Updated 4 years ago
Alternatives and similar repositories for elliptic-curve-explained
Users that are interested in elliptic-curve-explained are comparing it to the libraries listed below
Sorting:
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆12Sep 6, 2020Updated 5 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Nearly generic prime field implementation in Go☆24Feb 11, 2020Updated 6 years ago
- Nim (the language) bindings for ffmpeg☆10Nov 2, 2017Updated 8 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- A copy of the verifiable computation projects from Microsoft Research, Pinnochio and Gepetto☆18Sep 17, 2019Updated 6 years ago
- GPU-acceselerated cryptography libraries for ZKsync☆22Jan 20, 2026Updated 3 weeks ago
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Dec 8, 2022Updated 3 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- ☆22Dec 19, 2024Updated last year
- A library of gadgets compatible with bellpepper and bellperson (contact: @huitseeker)☆18Mar 3, 2025Updated 11 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- ☆21Sep 6, 2020Updated 5 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- Argument systems for inner pairing products☆44Jul 31, 2024Updated last year
- Code used for the yearly calculations of CO2e from Bitcoin mining☆19Jun 24, 2018Updated 7 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- negamax AI algorithm for turn-based games☆13Oct 6, 2019Updated 6 years ago
- Dynamic analysis of multithreaded C programs☆13Feb 7, 2020Updated 6 years ago
- stateless model checking for thread libraries, kernels, and transactional memory☆10Dec 26, 2018Updated 7 years ago
- Comparison of leading error-correcting code implementations☆12Aug 19, 2022Updated 3 years ago
- A small test for multithreaded C++ stack unwinding on unixes☆16Feb 24, 2020Updated 5 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 2 months ago
- Fast Bytecode Analysis☆15Jan 2, 2016Updated 10 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 6 months ago
- Analog circuit simulation library; wrapper for ngspice☆10Aug 31, 2020Updated 5 years ago
- ☆12Nov 23, 2020Updated 5 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Server and dashboard components☆12Jun 24, 2024Updated last year
- ☆10Aug 8, 2022Updated 3 years ago
- An experimental library for PDP and POR☆31Feb 3, 2021Updated 5 years ago
- A ziglang implementation of the SSZ serialization protocol☆30Updated this week
- Optimized implementation of the Picnic signature scheme☆82Sep 2, 2022Updated 3 years ago
- Proof of concept on a predictive maintenance use case using federated learning to continuously improve predictions of the remaining life…☆11Feb 21, 2020Updated 5 years ago