isec-tugraz / PicnicLinks
Optimized implementation of the Picnic signature scheme
☆81Updated 2 years ago
Alternatives and similar repositories for Picnic
Users that are interested in Picnic are comparing it to the libraries listed below
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆164Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- ☆52Updated 2 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 2 months ago
- C crypto library☆24Updated 2 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆89Updated 2 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- lattice-based digital signature scheme qTESLA☆33Updated 5 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated last month
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- Oblivious transfer library for rust☆11Updated 5 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆82Updated 7 years ago
- BLS working standard draft☆39Updated 5 years ago
- ☆18Updated 4 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- ☆22Updated 8 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆37Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago