mcarrickscott / modarithLinks
Script generated finite field arithmetic for elliptic curve cryptography
☆23Updated last week
Alternatives and similar repositories for modarith
Users that are interested in modarith are comparing it to the libraries listed below
Sorting:
- ☆17Updated last month
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆21Updated 5 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Banquet implementation☆14Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Official SQISignHD code, version under continuous development.☆12Updated 3 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Crypto library☆66Updated 3 weeks ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- MAYO C implementation☆19Updated 7 months ago
- Latex classes for IACR publications.☆14Updated last month
- ☆36Updated 3 years ago
- Experiments with Universal Composability in EasyCrypt☆41Updated last week
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- Formal Analysis of the PQXDH Protocol☆28Updated last year
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Curve ecGFp5☆68Updated 3 years ago
- Reference repository on Lattice-based Cryptography☆26Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- Hashing to Elliptic Curves☆80Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- Examples for EasyCrypt Lectures☆26Updated 2 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- An implementation of a post quantum anonymous credential scheme☆16Updated 10 months ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago