micciancio / SWIFFTLinks
An efficient lattice-based cryptographic hash function
☆28Updated 9 years ago
Alternatives and similar repositories for SWIFFT
Users that are interested in SWIFFT are comparing it to the libraries listed below
Sorting:
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆65Updated 2 years ago
- zkInterface is a protocol for the interoperability of zero-knowledge frameworks.☆128Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- Hashing to Elliptic Curves☆80Updated last year
- C++ library for Finite Fields and Elliptic Curves☆166Updated 4 years ago
- Python-based system for zk-SNARK based verifiable computations and smart contracts☆84Updated 6 years ago
- Curve ecGFp5☆69Updated 3 years ago
- An independent reimplementation of (vn)TinyRAM☆38Updated 9 years ago
- Zero-Knowledge Swiss Knife☆96Updated 3 years ago
- Elliptic curve pairing in Python☆56Updated 5 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Updated 7 years ago
- ☆118Updated 4 years ago
- oZKS (Ordered Zero-Knowledge Set) is a library that provides an implementation of an Ordered (and Append Only) Zero-Knowledge Set.☆28Updated 2 months ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆30Updated 5 years ago
- Cryptographic Accumulators in Rust☆66Updated 4 years ago
- ☆31Updated last month
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- DEPRECATED☆22Updated 4 years ago
- Implementation of various primitives for bellman using CUDA (WIP)☆28Updated 6 years ago
- Algorand's reference implementation of bls signature scheme☆49Updated 2 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- ☆60Updated 8 years ago
- ☆51Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆37Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆167Updated 2 years ago
- Robust MPC-based confidentiality layer for blockchains☆137Updated 4 years ago