AdamISZ / borring
Basic implementation of Borromean ring signatures in Python, for learning
☆13Updated 7 years ago
Alternatives and similar repositories for borring:
Users that are interested in borring are comparing it to the libraries listed below
- ☆9Updated 5 years ago
- Batch verifier for zkSNARKs☆10Updated last year
- Elliptic Curve Implementation in Solidity☆24Updated 11 months ago
- ☆11Updated 4 years ago
- Making sure Eth2 clients are breathing properly (network testing)☆10Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆13Updated 4 years ago
- sha256(sha256(preimage)) in zk☆13Updated 3 years ago
- SPV-based ETH/BTC swaps☆11Updated 2 years ago
- ☆12Updated 4 years ago
- ☆15Updated 3 years ago
- ☆15Updated 4 years ago
- 🛰️🎭☆10Updated 3 years ago
- ☆15Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- ☆17Updated 6 years ago
- DEPRECATED☆22Updated 4 years ago
- Fast additive accumulators☆14Updated 4 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆31Updated 5 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆16Updated 5 years ago
- Upstream research, development and discussion relating to the NuCypher protocol and economic design☆14Updated 4 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation☆14Updated last year
- zkSNARKs for Bitcoin transaction inclusion proofs on Ethereum via ZoKrates☆11Updated 5 years ago
- The Ethereum Research companion: research summary, impacts, specifications, status, resources, implementations☆16Updated 6 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Website!☆21Updated 2 years ago
- This repository compiles the work that the BSC team does on Eth2.0.☆13Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago