MystenLabs / ed25519-unsafe-libsView external linksLinks
List of unsafe ed25519 signature libs
☆244Oct 29, 2023Updated 2 years ago
Alternatives and similar repositories for ed25519-unsafe-libs
Users that are interested in ed25519-unsafe-libs are comparing it to the libraries listed below
Sorting:
- Common cryptographic library used in software at Mysten Labs.☆304Updated this week
- Compress cryptographic outputs via mining☆25Nov 15, 2022Updated 3 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Argument systems for inner pairing products☆44Jul 31, 2024Updated last year
- Research papers☆16Apr 3, 2023Updated 2 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆20May 10, 2020Updated 5 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- ☆27Oct 18, 2022Updated 3 years ago
- Soverign rollup based on Rollkit, Cairo VM for the application layer and Bitcoin as a DA layer☆13Jul 14, 2023Updated 2 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform☆179Oct 17, 2022Updated 3 years ago
- ☆33Feb 14, 2025Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 4 months ago
- ☆45May 7, 2025Updated 9 months ago
- ☆139Jul 13, 2022Updated 3 years ago
- Horizontally scalable blockchain using STARK's and partitioned transactional memory☆56Jun 7, 2022Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- Benchmarking Polynomial Commitments☆51Jul 3, 2023Updated 2 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆53Aug 6, 2022Updated 3 years ago
- Universal covert privacy-enhancing transactions for any blockchain that supports ECDSA or Schnorr☆29Jan 8, 2023Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- An api for constructing sparse Merkle tree accumulators with random sampling capabilities.☆25Oct 19, 2021Updated 4 years ago
- Delve into low-level RISC Zero machine☆30Dec 25, 2023Updated 2 years ago
- A STARK-friendly elliptic curve defined over a sextic extension of a small prime field.☆39Dec 5, 2023Updated 2 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- ☆23May 29, 2020Updated 5 years ago
- DPC with Universal Setup☆46May 25, 2023Updated 2 years ago
- Algorand's implementation of pixel consensus signature☆22Apr 7, 2023Updated 2 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Curdleproofs is a zero-knowledge shuffle argument☆70Oct 16, 2023Updated 2 years ago
- Low-level language for encoding AIR of computations☆38May 7, 2023Updated 2 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Reference repository on Lattice-based Cryptography☆26Oct 22, 2024Updated last year