usnistgov / Circuits
Circuits for functions of interest to cryptography
☆27Updated 7 months ago
Related projects: ⓘ
- ☆28Updated 2 years ago
- Banquet implementation☆13Updated 2 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆18Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- A collection of high-performance crypto implementations.☆44Updated 2 months ago
- Reference implementations of post-quantum cryptographic primitives☆25Updated 8 months ago
- Optimized Binary GCD for Modular Inversion☆42Updated 3 years ago
- ☆19Updated this week
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- ☆9Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆26Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Crypto library☆50Updated last month
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆27Updated this week
- An AES-based 384 bit permutation.☆18Updated 5 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated last year
- A programming language to write bitsliced ciphers☆55Updated 2 weeks ago
- Curve ecGFp5☆66Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆14Updated last week
- Code for zero-knowledge middleboxes☆57Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last week
- Constant-time choose between two variables in Clang/LLVM☆18Updated 6 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆15Updated 7 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆38Updated 3 years ago
- ☆32Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆29Updated 10 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆27Updated 2 weeks ago