ZenGo-X / two-party-ecdsaLinks
☆17Updated 10 months ago
Alternatives and similar repositories for two-party-ecdsa
Users that are interested in two-party-ecdsa are comparing it to the libraries listed below
Sorting:
- State-of-art threshold ECDSA in Rust☆82Updated last week
- Multi-Party Threshold Signature Library for ECDSA☆33Updated 2 months ago
- Threshold BLS signatures in Rust☆72Updated 3 years ago
- Threshold ECDSA via Triples☆79Updated last year
- Rust implementation for zcash/pasta☆84Updated last month
- A threshold cryptography library in Rust☆112Updated 10 months ago
- ☆72Updated 2 years ago
- Threshold BLS Signatures and DKG☆76Updated last week
- MPC protocols for threshold ECDSA☆47Updated last year
- Poseidon hash function☆75Updated 2 years ago
- Elliptic curve group traits and utilities.☆94Updated last month
- Aggregatable Distributed Key Generation☆46Updated 3 years ago
- Zero-knowledge gadgets for Webb's cross-chain blockchain applications.☆93Updated 2 years ago
- A pure-Rust implementation of Bulletproofs using Ristretto.☆61Updated 10 months ago
- Implementation of the Zcash Orchard Protocol☆55Updated 3 weeks ago
- BabyJubJub elliptic curve implementation and EdDSA signature scheme in Rust☆43Updated last year
- An elastic proof system based on arkworks☆84Updated last year
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆56Updated 2 years ago
- Composable proof transcripts for public-coin arguments of knowledge☆49Updated 9 months ago
- Arithmatic circuits convertible to R1CS based on Bulletproofs☆90Updated 2 years ago
- ☆112Updated last year
- Implementation of the FROST protocol for threshold Ed25519 signing☆68Updated last year
- Rust library for efficient, succinct and modular set membership and non-membership proofs☆58Updated 4 years ago
- Fast implementation of multi-scalar multiplication in WebAssembly☆33Updated 6 months ago
- examples for bellman zk-snarks library☆77Updated 6 years ago
- ☆72Updated last year
- ☆40Updated 2 years ago
- ☆45Updated 3 weeks ago
- ☆42Updated 3 years ago
- Interfaces and implementations of cryptographic primitives, along with R1CS constraints for them☆211Updated 2 months ago