octaviopk9 / lattice-based-cryptographyLinks
Reference repository on Lattice-based Cryptography
☆26Updated last year
Alternatives and similar repositories for lattice-based-cryptography
Users that are interested in lattice-based-cryptography are comparing it to the libraries listed below
Sorting:
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- ☆10Updated last year
- ☆17Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- A basic implementation of Yao's Garbled Circuits☆30Updated 3 years ago
- SageMath library for constructing elliptic curves☆73Updated 2 years ago
- ☆26Updated 10 months ago
- Elliptic curve search experiments☆35Updated 2 years ago
- The instance generator of the Vision and Rescue block ciphers.☆17Updated 3 years ago
- Implementation of the ZKB++ proof system☆20Updated 6 years ago
- Latex classes for IACR publications.☆14Updated 2 weeks ago
- Hashing to Elliptic Curves☆80Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- Curve ecGFp5☆69Updated 3 years ago
- Initial Rust implementation of FAEST☆13Updated 2 years ago
- Examples for EasyCrypt Lectures☆26Updated 4 months ago
- LegoGroth16 implementation on top of Zexe☆25Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- High Assurance Cryptographic Software☆10Updated 3 weeks ago
- Raccoon Signature Scheme -- Reference Code☆12Updated 2 years ago
- elliptic curve construction tool☆17Updated 2 years ago
- Oblivious key-value store based on Circuit ORAM☆34Updated 9 months ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Updated 2 years ago
- toy implementation of bfv in rust☆27Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 3 years ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆38Updated last month
- addition chains☆20Updated 7 years ago
- An implementation of a post quantum anonymous credential scheme☆16Updated last year