Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme
☆17Oct 11, 2016Updated 9 years ago
Alternatives and similar repositories for blzzrd
Users that are interested in blzzrd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆20May 10, 2020Updated 5 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Go HTTP Strict Transport Security library☆22Oct 3, 2024Updated last year
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated 2 years ago
- Post-quantum digital signatures in JavaScript☆16Jun 16, 2016Updated 9 years ago
- ☆100Jul 31, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- OCaml parsers for multiple key formats☆15Aug 1, 2024Updated last year
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- Privacy Protected On-chain Identity Based on Zero Knowledge Proof☆10Apr 3, 2023Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- An implementation of the Skein hash function for ARMv7 with NEON☆14Nov 16, 2011Updated 14 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- List of crackpot 'scientists' and 'thinkers'☆23Jun 22, 2025Updated 10 months ago
- Clojure library that abstracts libsodium's NaCl primitives (curve25519, ed25519, blake2b, box/unbox, sign/verify, etc.)☆10Jul 4, 2016Updated 9 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Mar 11, 2025Updated last year
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 6 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Blind signatures over secp256k1 elliptic curve☆16May 17, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Jun 29, 2015Updated 10 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- local dns cache to anti dns polution in china. inspired by chinadns. writing in ruby☆11Jul 8, 2020Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago