zkcrypto / curve25519-dalek-ng
A pure-Rust implementation of group operations on Ristretto and Curve25519
☆28Updated 5 months ago
Alternatives and similar repositories for curve25519-dalek-ng:
Users that are interested in curve25519-dalek-ng are comparing it to the libraries listed below
- toy implementation of bfv in rust☆26Updated 2 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆37Updated 2 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- Ed25519 suitable for use in consensus-critical contexts.☆46Updated 5 months ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆67Updated 3 years ago
- ☆24Updated 2 years ago
- ☆27Updated last year
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆25Updated 10 months ago
- Argument systems for inner pairing products☆41Updated 5 months ago
- Collection of sponge functions written in pure Rust☆42Updated this week
- Compiles r1cs gadgets to the zkinterface format☆10Updated 3 years ago
- Banquet implementation☆13Updated 2 years ago
- Rust encryption library for practical time-lock encryption.☆29Updated 6 months ago
- Class Groups in Rust☆11Updated 5 years ago
- fft impl for ff::Field☆15Updated 8 months ago
- An implementation of ZKBoo☆33Updated 2 years ago
- RSA blind signatures in Rust☆29Updated 3 weeks ago
- Challenge Bypass using the Ristretto group☆35Updated last month
- FN-DSA (Falcon) signature scheme☆33Updated this week
- An implementation of the DudeCT constant-time function tester☆21Updated last year
- A Rust implementation of the Strobe protocol framework☆25Updated 6 months ago
- An implementation of ATProto's Merkle Search Tree☆17Updated last year
- A Rust implementation of CPace, a balanced PAKE.☆26Updated last year
- Rust crate for BLS signatures☆32Updated 6 months ago
- Wrappers around Rust's integer to check for constant-time-compatible usage☆22Updated 4 years ago
- Helpers for clearing sensitive data on the stack and heap☆54Updated 2 years ago
- Composable proof transcripts for public-coin arguments of knowledge☆126Updated last year
- Implementation of the Hades permutation algorithm used in Poseidon Hashes with ZKProof capabilities.☆22Updated last year
- High Assurance Cryptographic Software☆10Updated 2 months ago