pornin / crrlLinks
Rust library for cryptographic research
☆143Updated 9 months ago
Alternatives and similar repositories for crrl
Users that are interested in crrl are comparing it to the libraries listed below
Sorting:
- Curve ecGFp5☆68Updated 3 years ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆72Updated 5 months ago
- An implementation of ZKBoo☆33Updated 3 years ago
- toy implementation of bfv in rust☆27Updated 3 years ago
- ☆74Updated 2 years ago
- FN-DSA (Falcon) signature scheme☆46Updated 6 months ago
- Traits and utilities for working with finite fields.☆247Updated 6 months ago
- Composable proof transcripts for public-coin arguments of knowledge☆131Updated 2 years ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆70Updated 3 years ago
- A threshold cryptography library in Rust☆114Updated 3 months ago
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆60Updated 2 years ago
- Elliptic curve group traits and utilities.☆95Updated 6 months ago
- An elastic proof system based on arkworks☆85Updated last year
- Composable proof transcripts for public-coin arguments of knowledge☆49Updated last year
- Rust encryption library for practical time-lock encryption.☆34Updated last year
- Rust implementation for zcash/pasta☆83Updated 6 months ago
- Random prime generation and primality testing library based on `crypto-bigint`.☆25Updated last month
- Collection of sponge functions written in pure Rust☆47Updated 2 weeks ago
- A safe pure-rust implementation of the NTRU post-quantum scheme.☆21Updated 3 years ago
- Fiat-Shamir for the masses.☆77Updated this week
- A pure-Rust implementation of the Paillier encryption scheme☆38Updated 2 years ago
- A basic implementation of Yao's Garbled Circuits☆30Updated 3 years ago
- Generator and supporting evidence for security of the Pluto/Eris half-pairing cycle of elliptic curves☆31Updated 4 years ago
- Ed25519 suitable for use in consensus-critical contexts.☆50Updated last year
- A maliciously secure two-party computation engine which is embeddable and accessible☆188Updated 2 months ago
- Implementation of the Jubjub elliptic curve group☆122Updated last year
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆58Updated 2 years ago
- Fast implementation of multi-scalar multiplication in WebAssembly☆34Updated 10 months ago
- A pure-Rust implementation of Bulletproofs using Ristretto.☆63Updated last month
- Implementations of popular elliptic curves☆309Updated last year