Optimizations for Pairing-Based Cryptography
☆17Sep 10, 2021Updated 4 years ago
Alternatives and similar repositories for pairing
Users that are interested in pairing are comparing it to the libraries listed below
Sorting:
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Schnorr Signatures☆18Apr 16, 2020Updated 5 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Jan 2, 2023Updated 3 years ago
- High-performance Multi-scalar Multiplication for Pasta curves☆24Sep 6, 2025Updated 6 months ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- Pairing operations over the BLS12-381 elliptic curve in Haskell☆14Feb 18, 2022Updated 4 years ago
- Cairo implementation of operations over the elliptic curve BLS12-381☆14Feb 8, 2023Updated 3 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆19May 10, 2020Updated 5 years ago
- Arkworks made simple for us: the non cryptographer software plumbers☆25Feb 8, 2023Updated 3 years ago
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Source code for all entries from the 2023 ZPrize competition☆25Jan 29, 2026Updated last month
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- ☆13Mar 6, 2023Updated 3 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- Poseidon Rust library☆39Mar 13, 2023Updated 3 years ago
- efficient modular multiplication research☆15Feb 8, 2023Updated 3 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- An experimental rust zksnarks compiler with embeeded bellman-bn128 prover☆41May 29, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- Multilayered Linkable Spontaneous Anonymous Group - Implemented as is from paper. Not Monero specific☆24May 10, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Polkadot Protocol Conformance Tests☆10May 22, 2023Updated 2 years ago
- Elliptic curve search experiments☆35Mar 6, 2023Updated 3 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Authentication / Authorization server example with Rust, Warp, Postgres☆11Nov 9, 2020Updated 5 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- ☆114Feb 6, 2024Updated 2 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆41Oct 24, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Cryptographic protocols☆38Apr 19, 2023Updated 2 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year