Optimized Binary GCD for Modular Inversion
☆53Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for bingcd
Users that are interested in bingcd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 4 months ago
- ☆82Apr 18, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- X25519 Implementation for ARM Cortex-M0/M0+☆17Sep 24, 2020Updated 5 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 8 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆71Jun 26, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- Verifying constant-time code with symbolic execution☆48Oct 26, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Curve ecGFp5☆70Mar 31, 2022Updated 4 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Rust library for cryptographic research☆155Dec 27, 2024Updated last year
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Feb 20, 2021Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 8 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- P-256 ECDSA / ECDH for Cortex-M4 and Cortex-M33☆44Mar 4, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14May 15, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Delay Function Verification Smart Contract☆28May 4, 2021Updated 4 years ago
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated last year
- one of many proofs, ring signatures, and zerocoin algo from https://eprint.iacr.org/2014/764.pdf☆15Dec 12, 2022Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago