mmaker / draft-irtf-cfrg-sigma-protocolsLinks
This is only the beginning.
☆18Updated this week
Alternatives and similar repositories for draft-irtf-cfrg-sigma-protocols
Users that are interested in draft-irtf-cfrg-sigma-protocols are comparing it to the libraries listed below
Sorting:
- An implementation of a post quantum anonymous credential scheme☆15Updated 9 months ago
- Latex classes for IACR publications.☆13Updated 3 weeks ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆71Updated 4 months ago
- ☆23Updated last week
- Curve ecGFp5☆68Updated 3 years ago
- ☆26Updated 7 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆26Updated last year
- Banquet implementation☆13Updated 3 years ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆35Updated 4 months ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Updated 10 months ago
- Oblivious key-value store based on Circuit ORAM☆29Updated 6 months ago
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆57Updated 2 years ago
- Fiat-Shamir for the masses.☆76Updated this week
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Implementation of incrementally verifiable ledger system☆18Updated 4 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 3 years ago
- Elliptic curve search experiments☆35Updated 2 years ago
- A basic implementation of Yao's Garbled Circuits☆30Updated 3 years ago
- ☆42Updated this week
- SageMath library for constructing elliptic curves☆71Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated 2 weeks ago
- Implementation of the ZKB++ proof system☆19Updated 6 years ago
- addition chains☆20Updated 7 years ago
- ☆29Updated 2 years ago
- A silent threshold encryption scheme, which does not require any interaction during the setup phase☆35Updated 3 months ago
- Hashing to Elliptic Curves☆80Updated last year
- Generator and supporting evidence for security of the Pluto/Eris half-pairing cycle of elliptic curves☆32Updated 4 years ago
- toy implementation of bfv in rust☆27Updated 3 years ago