micciancio / SWIFFTLinks
An efficient lattice-based cryptographic hash function
☆28Updated 9 years ago
Alternatives and similar repositories for SWIFFT
Users that are interested in SWIFFT are comparing it to the libraries listed below
Sorting:
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆68Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- C++ library for Finite Fields and Elliptic Curves☆168Updated 4 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- ☆31Updated 2 months ago
- Pointcheval Sanders signature☆27Updated 6 years ago
- A scheme that produces a zero-knowledge proof of correctness for an MPC computation. The scheme allows anyone, particularly someone exter…☆26Updated last year
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Curve ecGFp5☆69Updated 3 years ago
- BLS working standard draft☆40Updated 6 years ago
- Bulletproofs and Bulletproofs+ Rust implementation for Aggregated Range Proofs over multiple elliptic curves☆77Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Zero-Knowledge Swiss Knife☆97Updated 3 years ago
- ☆60Updated 8 years ago
- ☆118Updated 4 years ago
- Hashing to Elliptic Curves☆80Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago
- Implementation of various primitives for bellman using CUDA (WIP)☆28Updated 6 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- ☆35Updated 4 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆97Updated 3 years ago
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆38Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- C++ implementation of Distributed Verifiable Random Functions☆25Updated 5 years ago