Signature scheme submitted to NIST's Post-Quantum Cryptography Project
☆31Jan 17, 2018Updated 8 years ago
Alternatives and similar repositories for prune-horst
Users that are interested in prune-horst are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Jul 24, 2018Updated 7 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 5 years ago
- High Assurance Cryptographic Software☆10Updated this week
- [unmaintenance] A experimental post-quantum cryptography library☆136May 14, 2019Updated 7 years ago
- NTRUEncrypt library interface for Rust☆12Oct 29, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Latex classes for IACR publications.☆15Apr 1, 2026Updated last month
- 👥 A Python post-quantum cryptography library☆64Sep 9, 2016Updated 9 years ago
- Patch files to allow post-quantum OQS key exchange libraries to be used with OpenSSH☆16Aug 30, 2022Updated 3 years ago
- A pure-Rust implementation of Curve41417☆16Aug 28, 2015Updated 10 years ago
- BLAKE2 AVX2 implementations☆23Dec 22, 2019Updated 6 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 8 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆29Jun 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool for verifying transitions in cryptographic game-hopping proofs☆20May 13, 2026Updated last week
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Generate various time series, some randomly sampled, in pure rust.☆19Apr 17, 2026Updated last month
- A Rust implementation of the Gravity-post-quantum signature schemes☆19May 6, 2026Updated 2 weeks ago
- A minimal RedJubjub implementation for use in Zebra.☆30Mar 27, 2026Updated last month
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 6 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Helpers for clearing sensitive data on the stack and heap☆53Jun 14, 2025Updated 11 months ago
- A Rust implementation of the Message Layer Security group messaging protocol☆116Aug 14, 2023Updated 2 years ago
- SPARX block ciphers implementations for Rust.☆17Jan 29, 2026Updated 3 months ago
- Practical Implementation of the Maurer Reduction☆11Jul 13, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Sep 28, 2020Updated 5 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- ☆16Apr 16, 2022Updated 4 years ago
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆13May 25, 2020Updated 5 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆17Feb 12, 2026Updated 3 months ago