Crypto Audit Guidelines
☆135Dec 28, 2020Updated 5 years ago
Alternatives and similar repositories for cag
Users that are interested in cag are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 3 months ago
- Guidelines for low-level cryptography software☆1,203Jun 11, 2023Updated 2 years ago
- ☆14May 3, 2019Updated 6 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Sep 10, 2024Updated last year
- ☆15Jul 8, 2021Updated 4 years ago
- Curve ecGFp5☆69Mar 31, 2022Updated 4 years ago
- Implements ristretto255, a fast prime-order group.☆109Feb 19, 2026Updated last month
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 6 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆22Aug 24, 2020Updated 5 years ago
- A Zero-Knowledge Toolkit☆15Oct 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Fuzzing Go crypto☆74Apr 3, 2019Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- dalek-compatible implementation of the merlin transcript protocol☆28Feb 11, 2020Updated 6 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Presentations about R1CS☆19May 1, 2019Updated 6 years ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆72Nov 30, 2021Updated 4 years ago
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- Reverse Liquidity Split (RLS) - Implementation in Solidity☆10Jan 1, 2022Updated 4 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆191Jun 27, 2022Updated 3 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 7 years ago
- EIP1962 implementation effort☆69Jul 2, 2024Updated last year
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Rust library for cryptographic research☆153Dec 27, 2024Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated last year
- GOO(Gradual Ownership Optimization) issuance implementation using Huff☆34Oct 1, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago