zooko / hash-function-survey
a web page / paper
☆18Updated 8 years ago
Alternatives and similar repositories for hash-function-survey:
Users that are interested in hash-function-survey are comparing it to the libraries listed below
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 4 years ago
- Rust bindings to formally-proven field arithmetic operations from MIT's fiat-crypto project☆12Updated 5 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆36Updated last year
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 8 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 6 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Go implementations of BLAKE2b and BLAKE2s with support for salts and personalization☆10Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 4 years ago
- High Assurance Cryptographic Software☆10Updated 3 months ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 11 months ago
- U2f implementation with threshold signatures☆16Updated 4 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Updated 2 years ago
- ☆19Updated 7 years ago
- ☆19Updated 2 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆27Updated last year
- a CCA-secure module-lattice-based KEM☆15Updated 6 years ago
- Go implementation of rendezvous protocol☆12Updated last year
- Collection of test vectors for cryptographic operations☆11Updated 9 years ago
- Experimental language for verifiable computation using zero-knowledge proofs☆25Updated 6 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 8 years ago