mmcloughlin / addchain
Cryptographic Addition Chain Generation in Go
☆188Updated 8 months ago
Alternatives and similar repositories for addchain:
Users that are interested in addchain are comparing it to the libraries listed below
- Constant time big numbers for Go☆100Updated 3 weeks ago
- Package bn256 implements a particular bilinear group.☆128Updated 3 months ago
- Pure Go implementation of the Ristretto prime-order group over Edwards25519☆88Updated 2 years ago
- goff (go finite field) is a unix-like tool that generates fast field arithmetic in Go.☆75Updated 2 years ago
- Implements ristretto255, a fast prime-order group.☆98Updated 3 years ago
- Hashing to Elliptic Curves☆81Updated 6 months ago
- Community Cryptography Test Vectors☆73Updated last month
- Rust library for cryptographic research☆140Updated 2 months ago
- Curve ecGFp5☆68Updated 2 years ago
- Deployments of fancy cryptography☆134Updated 2 months ago
- filippo.io/edwards25519 — A safer, faster, and more powerful low-level edwards25519 Go implementation.☆156Updated last month
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆48Updated last year
- Elliptic Curve Cryptography Compiler: an incomplete experiment in code-generation for elliptic curves in Go☆54Updated 4 years ago
- High-speed BLS12-381 implementation in Go☆127Updated last year
- A homomorphic hash function☆77Updated 6 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 5 years ago
- Golang ed25519☆48Updated 3 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆18Updated last week
- Nitro Security Module for Go☆25Updated 2 years ago
- Secure Multi-Party Computation (MPC) with Go. This project implements secure two-party computation with Garbled circuit protocol.☆112Updated 5 months ago
- Supplementary cryptography libraries☆17Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Updated last year
- Implementation of the FROST protocol for threshold Ed25519 signing☆66Updated 10 months ago
- Algorand's reference implementation of bls signature scheme☆51Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Go implementation of the Kyber (version 3) post-quantum IND-CCA2 KEM.☆105Updated 4 months ago
- Experiments with Universal Composability in EasyCrypt☆33Updated this week
- A literate and test-driven implementation of ZK-STARKs☆39Updated 4 years ago
- Go implementation of OPAQUE (hidden password user registration and auth)☆58Updated 4 years ago