CodeShark / secp256k1Links
Optimized C++ ECDSA verifier for secp256k1
☆13Updated 12 years ago
Alternatives and similar repositories for secp256k1
Users that are interested in secp256k1 are comparing it to the libraries listed below
Sorting:
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 5 years ago
- Fork of secp256k1-zkp for the Grin/MimbleWimble project☆33Updated 2 years ago
- Implementation of perdersen commitments in node.js and solidity☆24Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Updated 7 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆66Updated 2 years ago
- Simulation framework for non-standard mining strategies☆58Updated 3 years ago
- A simple Python implementation of threshold BLS signatures.☆41Updated last year
- Learning how to bulletproofs☆36Updated 6 years ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆172Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- Personal fork of -zkp. Has some old mimblewimble stuff but mostly I just PR everything upstream now.☆84Updated last year
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆30Updated 9 years ago
- Optimized C library for EC operations on curve secp256k1☆48Updated last year
- Minimalistic implementation of a linkable spontaneously anonymous group (LSAG) signature scheme with python over elliptic curves.☆29Updated 4 years ago
- DEPRECATED☆22Updated 4 years ago
- Example to create merkle path proof using libsnark☆45Updated 4 years ago
- Publicly Verifiable Secret Sharing, and more...☆27Updated 9 months ago
- ☆44Updated 7 years ago
- A python implementation of distributed key generation over secp256k1☆13Updated 7 years ago
- Schnorr related examples (Schnorr, BN, MuSig, discreet log contracts)☆36Updated 6 years ago
- A Python reimplementation of the one-time ring signatures as found in Monero☆75Updated 3 years ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆32Updated 5 years ago
- ☆48Updated 10 years ago
- Pinocchio-based adaptive zk-SNARK and distributed computation☆17Updated 7 years ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆25Updated 3 years ago
- Random collection of zero-knowledge stuff☆17Updated 7 years ago
- Robust MPC-based confidentiality layer for blockchains☆138Updated 3 years ago
- ☆38Updated 6 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆30Updated 5 years ago