Optimized Binary GCD for Modular Inversion
☆52Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for bingcd
Users that are interested in bingcd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 3 months ago
- ☆82Apr 18, 2020Updated 5 years ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- X25519 Implementation for ARM Cortex-M0/M0+☆16Sep 24, 2020Updated 5 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆67Jun 26, 2024Updated last year
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- Curve ecGFp5☆69Mar 31, 2022Updated 3 years ago
- Rust library for cryptographic research☆152Dec 27, 2024Updated last year
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 7 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- P-256 ECDSA / ECDH for Cortex-M4 and Cortex-M33☆45Mar 4, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- ☆19Jul 13, 2020Updated 5 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆189Jun 27, 2022Updated 3 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14May 15, 2020Updated 5 years ago
- Delay Function Verification Smart Contract☆28May 4, 2021Updated 4 years ago
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated 11 months ago