isislovecruft / ristretto-donnaLinks
A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group
☆14Updated 4 years ago
Alternatives and similar repositories for ristretto-donna
Users that are interested in ristretto-donna are comparing it to the libraries listed below
Sorting:
- a web page / paper☆18Updated 8 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 6 years ago
- A memory-hard password hashing function.☆69Updated 2 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 4 years ago
- ☆19Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated last month
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 6 years ago
- High Assurance Cryptographic Software☆10Updated 6 months ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- ☆9Updated 2 years ago
- NIST P-256 signatures for Cortex-M4 microcontrollers☆14Updated 4 years ago
- ☆18Updated last year
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 9 years ago
- C crypto library☆24Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- pure-python routines for curve25519/ed25519☆36Updated 5 years ago
- specification and design documents☆54Updated 2 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 5 years ago