isec-tugraz / PicnicLinks
Optimized implementation of the Picnic signature scheme
☆82Updated 3 years ago
Alternatives and similar repositories for Picnic
Users that are interested in Picnic are comparing it to the libraries listed below
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- ☆51Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆43Updated 4 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 6 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆167Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated 2 weeks ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- ☆22Updated 9 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆81Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆45Updated 4 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 6 months ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Updated 7 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆37Updated 2 years ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- C crypto library☆24Updated 2 years ago
- Hashing to Elliptic Curves☆80Updated last year
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- ☆17Updated 4 years ago
- Crypto library☆66Updated last week