JeremyRubin / MASTLinks
6.858 final project.
☆18Updated 10 years ago
Alternatives and similar repositories for MAST
Users that are interested in MAST are comparing it to the libraries listed below
Sorting:
- Compiler for BitML☆27Updated 3 years ago
- The modular protocol framework based on Universal Composability☆18Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Updated 6 years ago
- ☆60Updated 8 years ago
- BLST-Verification☆23Updated 2 weeks ago
- Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings☆47Updated 5 years ago
- Fast additive accumulators☆14Updated 5 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 3 years ago
- ☆15Updated 6 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 3 years ago
- Supporting evidence for security of the baby_jubjub curve to be used in altbn128, Ethereum☆41Updated 6 years ago
- Zcash "Sapling" cryptography☆87Updated 2 months ago
- High Assurance Cryptographic Software☆10Updated last month
- A copy of the verifiable computation projects from Microsoft Research, Pinnochio and Gepetto☆18Updated 6 years ago
- Diffie-Hellman key exchange using the Ristretto255 group, in Rust.☆23Updated 3 years ago
- Cross-chain atomic swap protocol between Monero and Ethereum☆14Updated 4 years ago
- Multilayered Linkable Spontaneous Anonymous Group - Implemented as is from paper. Not Monero specific☆25Updated 5 years ago
- Elliptic curve search experiments☆35Updated 2 years ago
- Website!☆22Updated 3 years ago
- A library for decentralized private computation☆19Updated 4 years ago
- An independent reimplementation of (vn)TinyRAM☆38Updated 9 years ago
- Low-level language for encoding AIR of computations☆38Updated 2 years ago
- Futhark implementation of neptune-compatible Poseidon.☆27Updated 4 years ago
- TLA+ specifications of various protocols used by wallets in the nitro protocol.☆18Updated 5 years ago
- sha256(sha256(preimage)) in zk☆15Updated 4 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 4 years ago
- Argument systems for inner pairing products☆44Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 6 years ago
- Specification of the RenVM MPC algorithm☆19Updated 5 years ago
- Shared Lurk source code, including tests and library code.☆18Updated last year