isec-tugraz / PicnicLinks
Optimized implementation of the Picnic signature scheme
☆81Updated 3 years ago
Alternatives and similar repositories for Picnic
Users that are interested in Picnic are comparing it to the libraries listed below
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆45Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- C crypto library☆24Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- ☆51Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated 2 weeks ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- ☆22Updated 9 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- ☆135Updated 5 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆37Updated 7 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆90Updated 3 years ago
- lattice-based digital signature scheme qTESLA☆33Updated 5 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 months ago
- ☆18Updated 4 years ago
- ☆100Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Oblivious transfer library for rust☆11Updated 5 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago