constantine
constantine copied to clipboard
Constantine: modular, high-performance, zero-dependency cryptography stack for proof systems and blockchain protocols.
Making some of the functions public and starting to make the folder structure confirm with nimble package init structure. Added jsony, stew and gmp requirements. Note they are not bound...
https://github.com/mratsim/constantine/pull/69 introduced an assembly ode generator for x86 and x86-64 at https://github.com/mratsim/constantine/blob/7d29cb9/constantine/platforms/isa/macro_assembler_x86.nim We need the same for ARM for efficiency on Raspberry Pi, Phones, Apple Silicon and other resource-restricted devices....
Taken from the wiki page: https://github.com/mratsim/constantine/wiki/Constant-time-arithmetics * [Dudect](https://github.com/oreparaz/dudect) - Dude is my code constant-time * [Frama-C](http://blog.frama-c.com/index.php?post/2011/12/31/Do-not-use-AES-in-a-context-where-timing-attacks-are-possible) * [Usenix paper - Verifying constant-time implementation](http://haslab.uminho.pt/jba/files/16usenix.pdf) * [McBits: fast constant time crypto (Bernstein)](https://cryptojedi.org/papers/mcbits-20130616.pdf)...
Given that Constantine aims to be used for elliptic curve cryptographic, it is required to be proved bug-free. Traditional model checker like TLA+ or Spin are more suited to formally...
For curves without endomorphisms https://eprint.iacr.org/2017/669.pdf https://www.aimsciences.org/article/exportPdf?id=5c293be6-723e-4b97-ae1d-ff359e261cdb > Abstract > > This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierstrass curves over odd characteristic fields, which...
The Ethereum state will likely replace Merkle Trees by Verkle Trees for storage in the future. - Paper: https://klein.mit.edu/research/highschool/primes/materials/2018/Kuszmaul.pdf - Draft for EIP: https://notes.ethereum.org/uwK4EJypSHWyEZvivcYyJA > Simple Summary > > Introduce...
Goal: implement https://eips.ethereum.org/EIPS/eip-2333 Requestor: @Milerius for Trustwallet The goal is to provide EIP2333 primitives: > ## Simple Summary > > This EIP is a method based on a tree structure...
Based on the discussion in Nim Discord server, #security channel: It would be very nice to have a suite of fundamentals to be used non-experts with some good defaults, to...
Shacham and Waters 2008, https://eprint.iacr.org/2008/073.pdf (The same Shacham from the S in BLS signatures) The Dagger P2P storage requires Proof-of-storages (https://github.com/status-im/dagger-research/issues/16) and more specifically of retrievability: - description: https://github.com/status-im/nim-dagger/issues/12, -...
For privacy preserving p2p economic spam protection the Waku team designed rate-limiting nullifiers. - Writeup: https://vac.dev/rln-relay - Paper: https://github.com/vacp2p/research/blob/master/rln-research/Waku_RLN_Relay.pdf - Specs: - https://hackmd.io/tMTLMYmTR5eynw2lwK9n1w?view#RLN - https://rfc.vac.dev/spec/17/ - Discussions: - https://ethresear.ch/t/semaphore-rln-rate-limiting-nullifier-for-spam-prevention-in-anonymous-p2p-setting/5009 -...