sipa / safegcd-boundsView external linksLinks
Bounds on divsteps iterations in safegcd
☆57Sep 30, 2024Updated last year
Alternatives and similar repositories for safegcd-bounds
Users that are interested in safegcd-bounds are comparing it to the libraries listed below
Sorting:
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Naive implementation of ROAST protocol for robust threshold signatures☆33Sep 18, 2024Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆20Apr 22, 2024Updated last year
- DEPRECATED - Eth2 data availability sampling - Testground plan☆28Dec 27, 2021Updated 4 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Sep 5, 2024Updated last year
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- ☆17Aug 2, 2021Updated 4 years ago
- A PRF with low multiplicative complexity☆20Feb 18, 2020Updated 5 years ago
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Dec 8, 2022Updated 3 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- Simple library which implements a few hashes and does nothing else☆65Nov 30, 2022Updated 3 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- ☆12Sep 6, 2020Updated 5 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- ☆21Sep 6, 2020Updated 5 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- Custom tailored continuous integration system based on KVM running on bitcoinbuilds.org☆12Jul 28, 2019Updated 6 years ago
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Oct 18, 2021Updated 4 years ago
- A collection of various writeups on research topics☆52Jan 10, 2025Updated last year
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Finite Fields and Curves in Lean☆14Apr 6, 2023Updated 2 years ago
- preliminary, high-level eth2-client benchmarks☆16Oct 20, 2020Updated 5 years ago