mcarrickscott / modarithLinks
Script generated finite field arithmetic for elliptic curve cryptography
☆22Updated 3 weeks ago
Alternatives and similar repositories for modarith
Users that are interested in modarith are comparing it to the libraries listed below
Sorting:
- ☆16Updated last month
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 5 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- Banquet implementation☆13Updated 3 years ago
- MAYO C implementation☆16Updated 3 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆86Updated this week
- Official SQIsign code, version under continuous development☆31Updated 3 weeks ago
- Experiments with Universal Composability in EasyCrypt☆36Updated this week
- Formal Analysis of the PQXDH Protocol☆25Updated last year
- Reference repository on Lattice-based Cryptography☆25Updated 8 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- ☆36Updated 3 years ago
- Crypto library☆60Updated 3 weeks ago
- Proof-of-possession for KEM certificates using verifiable generation☆9Updated 3 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Official SQISignHD code, version under continuous development.☆13Updated last month
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Examples for EasyCrypt Lectures☆24Updated last week
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated 2 years ago
- Curve ecGFp5☆68Updated 3 years ago
- Hashing to Elliptic Curves☆81Updated 10 months ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 4 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago