kn-cs / nice-curves
Couple of "nice" curves at 128-bit and 224-bit security levels
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for nice-curves
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆14Updated 4 years ago
- fft impl for ff::Field☆15Updated 6 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 3 years ago
- ☆15Updated 5 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 3 years ago
- one of many proofs, ring signatures, and zerocoin algo from https://eprint.iacr.org/2014/764.pdf☆15Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆24Updated 8 months ago
- Joint effort with Matter Labs (https://matter-labs.io/) to make a ZK-friendly hash accumulator☆12Updated 5 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago
- Sonic implementation in Rust☆17Updated 5 years ago
- Various papers on crypto pertinent to zero knowledge proofs, etc☆23Updated 4 years ago
- Proof of Device☆20Updated last year
- ☆9Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- ☆11Updated 4 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated last year
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- ☆12Updated 3 years ago
- BLS working standard draft☆39Updated 5 years ago
- Algorand's reference implementation of bls signature scheme☆13Updated 4 years ago
- Banquet implementation☆13Updated 2 years ago
- High Assurance Cryptographic Software☆10Updated 8 months ago
- A list of exceptionally good cryptography libraries that inspire our work☆16Updated 5 years ago