JHU Advanced Topics in Applied Cryptography (601.745)
☆53Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for cryptoengineering
Users that are interested in cryptoengineering are comparing it to the libraries listed below
Sorting:
- ☆147Apr 24, 2025Updated 10 months ago
- ☆10Sep 25, 2020Updated 5 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Like shasum but for blake2b☆13Nov 8, 2018Updated 7 years ago
- System tuning recommendations for running cryptographic applications☆23Jun 13, 2016Updated 9 years ago
- Password encrypted overlay to Random Access modules☆16Apr 5, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Pure OCaml implementation of the Groth-Maller SNARK verifier (and associated crypto)☆54Jun 14, 2019Updated 6 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆13May 25, 2020Updated 5 years ago
- [wip] implementing origami VDF☆13Mar 1, 2023Updated 3 years ago
- ☆10Mar 24, 2020Updated 5 years ago
- ☆12Jun 11, 2019Updated 6 years ago
- ☆12Nov 11, 2022Updated 3 years ago
- Tendermint with an embedded BLS random beacon☆18Dec 11, 2022Updated 3 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆30Apr 18, 2019Updated 6 years ago
- Presentations about R1CS☆19May 1, 2019Updated 6 years ago
- Library for the verification of BGLS signatures on the EVM using Solidity.☆15Mar 14, 2018Updated 8 years ago
- ☆78Dec 10, 2019Updated 6 years ago
- Low-level X.509 verification☆20Jun 25, 2021Updated 4 years ago
- peer to peer replication for hyperlog using files you can send around on a USB stick☆14Feb 19, 2019Updated 7 years ago
- evm playground - optimizations, patterns and bytecode decoding☆15Dec 29, 2022Updated 3 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- Sparse MerkleTree implementation in Rust☆19Oct 16, 2019Updated 6 years ago
- Host untrusted bots for cabal☆20Aug 17, 2018Updated 7 years ago
- Ed25519 peculiarities - now in your browser☆11Feb 6, 2025Updated last year
- Composable proof transcripts for public-coin arguments of knowledge☆131Mar 9, 2023Updated 3 years ago
- ZSLBox offers some grpc endpoints to generate and verify proofs "à la ZCash": shielding, unshielding and shielded transfers.☆19Oct 2, 2018Updated 7 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- ☆14May 3, 2019Updated 6 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Jan 25, 2021Updated 5 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- This library is archived; see crypto-primities for the latest version of this code☆21Feb 15, 2023Updated 3 years ago
- cooperative computing cluster☆19May 19, 2019Updated 6 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Automated Cryptographic Transformations☆28Aug 23, 2021Updated 4 years ago