List of unsafe ed25519 signature libs
☆244Oct 29, 2023Updated 2 years ago
Alternatives and similar repositories for ed25519-unsafe-libs
Users that are interested in ed25519-unsafe-libs are comparing it to the libraries listed below
Sorting:
- Compress cryptographic outputs via mining☆25Nov 15, 2022Updated 3 years ago
- Common cryptographic library used in software at Mysten Labs.☆304Mar 5, 2026Updated 2 weeks ago
- Research papers☆16Apr 3, 2023Updated 2 years ago
- Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform☆180Oct 17, 2022Updated 3 years ago
- Tool for automatic diagnosis of configuration problems☆11Jun 1, 2023Updated 2 years ago
- Deterministic executor + network sim for tokio-based systems.☆20Jan 30, 2026Updated last month
- An api for constructing sparse Merkle tree accumulators with random sampling capabilities.☆25Oct 19, 2021Updated 4 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- DAPOL+ Proof of Liabilities using Bulletproofs and Sparse Merkle trees☆17Dec 27, 2023Updated 2 years ago
- Ed25519 suitable for use in consensus-critical contexts.☆55Aug 1, 2024Updated last year
- ☆47Mar 2, 2026Updated 2 weeks ago
- Celo Light Client (IBC compatible)☆16Feb 4, 2022Updated 4 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- ☆12Feb 17, 2023Updated 3 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 6 months ago
- ☆138Jul 13, 2022Updated 3 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- Soverign rollup based on Rollkit, Cairo VM for the application layer and Bitcoin as a DA layer☆13Jul 14, 2023Updated 2 years ago
- Horizontally scalable blockchain using STARK's and partitioned transactional memory☆56Jun 7, 2022Updated 3 years ago
- Mirror of official compiler-rt git repository located at http://llvm.org/git/compiler-rt. Updated every five minutes.☆11Nov 26, 2018Updated 7 years ago
- Universal covert privacy-enhancing transactions for any blockchain that supports ECDSA or Schnorr☆29Jan 8, 2023Updated 3 years ago
- Argument systems for inner pairing products☆44Jul 31, 2024Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆27Oct 18, 2022Updated 3 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- A Jupyter Notebook to monitor the status of a Capybot☆14Jun 23, 2023Updated 2 years ago
- Ed25519 peculiarities - now in your browser☆11Feb 6, 2025Updated last year
- Supersingular-isogeny key encapsulation (SIKE) over P434 in 6502/6510 assembly for Commodore 64☆25Feb 28, 2020Updated 6 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆19May 10, 2020Updated 5 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆53Aug 6, 2022Updated 3 years ago
- ☆33Feb 14, 2025Updated last year
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Unity project to test SuiDotnet interface☆16Sep 17, 2022Updated 3 years ago
- Convert SSH Ed25519 keys to age keys. This is useful for usage in sops-nix and sops.☆19Jun 7, 2025Updated 9 months ago
- Benchmarking Polynomial Commitments☆51Jul 3, 2023Updated 2 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- ☆22Feb 19, 2026Updated last month
- Rust sysroot source for Berkley Packet Filter Rust programs☆21Mar 26, 2021Updated 4 years ago