CodeShark / secp256k1Links
Optimized C++ ECDSA verifier for secp256k1
☆13Updated 12 years ago
Alternatives and similar repositories for secp256k1
Users that are interested in secp256k1 are comparing it to the libraries listed below
Sorting:
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 5 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Updated 7 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆31Updated 10 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Fork of secp256k1-zkp for the Grin/MimbleWimble project☆33Updated 2 years ago
- Simulation framework for non-standard mining strategies☆58Updated 3 years ago
- Personal fork of -zkp. Has some old mimblewimble stuff but mostly I just PR everything upstream now.☆84Updated last year
- Learning how to bulletproofs☆37Updated 6 years ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆172Updated 4 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆65Updated 2 years ago
- A PRF with low multiplicative complexity☆20Updated 5 years ago
- C++ library for Finite Fields and Elliptic Curves☆164Updated 3 years ago
- A Python reimplementation of the one-time ring signatures as found in Monero☆76Updated 3 years ago
- Optimized C library for EC operations on curve secp256k1☆47Updated last year
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆63Updated 10 years ago
- Example to create merkle path proof using libsnark☆45Updated 5 years ago
- Publicly Verifiable Secret Sharing, and more...☆27Updated last year
- Implementation of perdersen commitments in node.js and solidity☆24Updated 7 years ago
- Elliptic curve pairing in Python☆54Updated 5 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆30Updated 5 years ago
- C++ Bitcoin SPV Client☆12Updated 7 years ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆32Updated 5 years ago
- BLS signatures in C++, using the blst library for BLS12-381☆306Updated 2 months ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆25Updated 3 years ago
- Robust MPC-based confidentiality layer for blockchains☆137Updated 4 years ago
- Go implementation of the BIP Schnorr signature scheme.☆70Updated 4 years ago
- DEPRECATED☆22Updated 4 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 8 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Updated last year
- ☆79Updated 8 years ago