sipa / safegcd-boundsLinks
Bounds on divsteps iterations in safegcd
☆54Updated 8 months ago
Alternatives and similar repositories for safegcd-bounds
Users that are interested in safegcd-bounds are comparing it to the libraries listed below
Sorting:
- Optimized Binary GCD for Modular Inversion☆44Updated 4 years ago
- ☆22Updated 4 months ago
- A PRF with low multiplicative complexity☆21Updated 5 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 7 years ago
- My poster for Financial Crypto 2020 analysing the hash function requirements for Taproot to be secure in the generic group model.☆11Updated 5 years ago
- A detailed description of how Bitcoin Elements Alpha Confidential Transactions works☆58Updated 6 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Bulletproofs++: Even Shorter Range Proofs☆27Updated 3 years ago
- Taproot security proof☆22Updated 5 years ago
- Random collection of zero-knowledge stuff☆17Updated 7 years ago
- Compiler for BitML☆28Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Naive implementation of ROAST protocol for robust threshold signatures☆34Updated 9 months ago
- C crypto library☆24Updated last year
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Documentation about scriptless scripts☆167Updated 5 months ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated last year
- zkChannels: Anonymous Payment Channels for Bitcoin, Zcash, Tezos and more☆71Updated 3 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 9 months ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆66Updated 2 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆26Updated 4 years ago
- From Zero (Knowledge) to Bulletproofs - writeup☆155Updated 2 years ago
- BLST-Verification☆22Updated 4 months ago
- High Assurance Cryptographic Software☆10Updated 7 months ago
- BLS working standard draft☆39Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- A collection of various writeups on research topics☆55Updated 5 months ago
- ☆35Updated 8 months ago