lonkey / simple-cryptographic-algorithms
Python library for demonstrating the functionality of common cryptographic algorithms
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for simple-cryptographic-algorithms
- A community driven resource for learning CryptoGraphy☆56Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆60Updated 10 months ago
- Deployments of fancy cryptography☆124Updated 2 weeks ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆34Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Reference implementation in Python of Poseidon and optimized Poseidon (Neptune) hash functions☆76Updated last year
- ☆7Updated 2 years ago
- Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).☆13Updated this week
- BGN encryption scheme implementation using Go☆14Updated 4 years ago
- Rust crypto library for data privacy tools☆94Updated last week
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆20Updated last month
- List of crackpot 'scientists' and 'thinkers'☆14Updated 2 months ago
- Source code for "Building Cryptographic Proofs from Hash Functions"☆158Updated last month
- Interactive documentation on zero-knowledge proof systems and related primitives.☆145Updated 3 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- Secure Multi-Party Computation (MPC) with Go. This project implements secure two-party computation with Garbled circuit protocol.☆109Updated 3 weeks ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆80Updated last year
- Batch Dual Execution framework for secure multiparty computation☆14Updated 7 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 3 years ago
- Tool for generating Elliptic curve domain parameters☆109Updated 10 months ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆62Updated 2 months ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- "One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum☆39Updated 5 years ago
- elliptic-curve cryptography☆29Updated last year
- A curated list of zero-knowledge folding schemes☆280Updated 3 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- Zero-Knowledge Swiss Knife☆94Updated last year
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year