Implementation of the Fish and Begol signature schemes
☆14Jul 3, 2017Updated 8 years ago
Alternatives and similar repositories for fish-begol
Users that are interested in fish-begol are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Jun 12, 2023Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- ☆52May 12, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- An OpenSSL Engine that interfaces with the TrouSerS tpm 1.2 stack (fork of official upstream on SourceForge, featuring OpenSSL 1.1 suppor…☆10Dec 30, 2024Updated last year
- 一个关于待办事项提醒的项目☆14Apr 13, 2017Updated 8 years ago
- Initial Rust implementation of FAEST☆13Jul 6, 2023Updated 2 years ago
- A PoC implementation of Raptor: lattice based linkable ring signature scheme☆15Jul 17, 2020Updated 5 years ago
- A high-performance tool for Zcash blockchain science and exploration☆10Jul 5, 2019Updated 6 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- The Simplest Oblivious Transfer Protocol by Chou and Orlandi. http://users-cs.au.dk/orlandi/simpleOT/☆12Aug 8, 2019Updated 6 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Optimized implementation of the Picnic signature scheme☆83Sep 2, 2022Updated 3 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆12Apr 26, 2013Updated 12 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 7 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆29Jun 7, 2024Updated last year
- A stopgap solution for the lack of notifications on gists☆11Dec 1, 2014Updated 11 years ago
- Proving historical Ethereum transactions using the Plonky2 zkEVM☆14Jul 26, 2024Updated last year
- Collection of MPC Protocols, mostly using libscapi☆13Nov 3, 2019Updated 6 years ago
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- DEPRECATED -- real-time co-operative LaTeX editing☆29Dec 15, 2011Updated 14 years ago
- An efficient circuit implementation of SHA256.☆12Jan 14, 2018Updated 8 years ago
- ☆14Dec 8, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Feb 9, 2018Updated 8 years ago
- Infinite procedurally generated terrain, rendered with WebGL☆13Jul 25, 2018Updated 7 years ago
- A collection of python scripts to make minor edits to video, audio, and transcription files.☆14Mar 28, 2024Updated last year
- ECDSA algorithm C++ wrap library.☆10Jan 7, 2018Updated 8 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Flower framework for Federated Learning, with Fully Homomorphic Encryption integrated☆13Jun 3, 2024Updated last year
- A portable simplest oblivious transfer library.☆15Mar 30, 2025Updated 11 months ago