CodeShark / secp256k1Links
Optimized C++ ECDSA verifier for secp256k1
☆13Updated 12 years ago
Alternatives and similar repositories for secp256k1
Users that are interested in secp256k1 are comparing it to the libraries listed below
Sorting:
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 5 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Updated 7 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆30Updated 10 years ago
- Fork of secp256k1-zkp for the Grin/MimbleWimble project☆33Updated 2 years ago
- A Python reimplementation of the one-time ring signatures as found in Monero☆75Updated 3 years ago
- Example to create merkle path proof using libsnark☆45Updated 4 years ago
- Personal fork of -zkp. Has some old mimblewimble stuff but mostly I just PR everything upstream now.☆84Updated last year
- Simulation framework for non-standard mining strategies☆58Updated 3 years ago
- Learning how to bulletproofs☆36Updated 6 years ago
- ☆44Updated 7 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆66Updated 2 years ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆172Updated 4 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆181Updated 3 years ago
- Go implementation of the BIP Schnorr signature scheme.☆70Updated 4 years ago
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆64Updated 10 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Updated 11 months ago
- ☆79Updated 8 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Optimized C library for EC operations on curve secp256k1☆48Updated last year
- C++ library for Finite Fields and Elliptic Curves☆164Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆9Updated 5 years ago
- MPC implementation of proof of custody☆32Updated 4 years ago
- Publicly Verifiable Secret Sharing, and more...☆27Updated 10 months ago
- Robust MPC-based confidentiality layer for blockchains☆138Updated 3 years ago
- ☆24Updated 7 years ago
- Alternative zk-SNARK proof verifier written in Rust for Zcash Sprout.☆22Updated 7 years ago
- ☆52Updated 2 years ago
- A simple Python implementation of threshold BLS signatures.☆41Updated last year
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- DEPRECATED☆22Updated 4 years ago