Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation
☆11Apr 30, 2014Updated 11 years ago
Alternatives and similar repositories for Py-EC
Users that are interested in Py-EC are comparing it to the libraries listed below
Sorting:
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- A PoC implementation of Raptor: lattice based linkable ring signature scheme☆14Jul 17, 2020Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last week
- CircleHash is a family of fast hashes -- CircleHash64f is ideal for short inputs, reaching 10GB/s starting at <64 bytes and 15GB/s at 256…☆22Feb 16, 2026Updated last week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year
- Python implementation of FIPS SHA3 and SHAKE☆45Feb 9, 2018Updated 8 years ago
- 📖 A template for documenting your code.☆10Dec 23, 2016Updated 9 years ago
- JavaScript compiler for Scratch projects.☆11Sep 24, 2017Updated 8 years ago
- libmaxminddb binding for Ruby☆10Aug 17, 2023Updated 2 years ago
- C++ API for Buttplug IO☆12Aug 8, 2025Updated 6 months ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ☆10Mar 4, 2024Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A collection of algorithms to reverse using partial information various hashes used by Minecraft to seed its ChunkRandom PRNG.☆10Mar 7, 2024Updated last year
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- An application built to monitor CS:GO prices on the Steam market☆13Dec 29, 2021Updated 4 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- Higher Subleq is a simplified typeless C language.☆12Oct 21, 2015Updated 10 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- ☆12Apr 9, 2018Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- A modular Android debloating tool☆10Jul 30, 2022Updated 3 years ago
- Replacement for Fujitsu Cortex-M3/M4 serial programming mode☆13Sep 4, 2017Updated 8 years ago
- Simple 16-bit x86 decompression algorithm☆15Aug 7, 2017Updated 8 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Comparison of leading error-correcting code implementations☆12Aug 19, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Python Discord bot that can be used for bridging two servers' channels together.☆10Feb 23, 2021Updated 5 years ago
- GHCJS DOM Hello World, an example package☆10Apr 24, 2025Updated 10 months ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Small TS library to type and safely handle `serde` JSON serializations of Rust enums.☆11Nov 14, 2024Updated last year
- ☆19Nov 30, 2022Updated 3 years ago
- Attacking the Nintendo 3DS Boot ROMs☆13Feb 2, 2018Updated 8 years ago
- A multi-platform Unix CLI that prints a symlink's complete chain of targets using absolute paths.☆13Dec 27, 2022Updated 3 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago