☆15May 27, 2021Updated 4 years ago
Alternatives and similar repositories for zengo-will
Users that are interested in zengo-will are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 4 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- FS-DKR: One Round Distributed Key Rotation☆34Oct 20, 2023Updated 2 years ago
- Network layer for MPC (Secure Multi-Party Computation) based on Tendermint☆99Jan 19, 2021Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- efficient modular multiplication research☆15Feb 8, 2023Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- ☆28Jan 12, 2026Updated 2 months ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Aggregatable Distributed Key Generation☆49Apr 6, 2022Updated 3 years ago
- Wallet for Binance chain powered by two-party ECDSA☆51Sep 16, 2019Updated 6 years ago
- WASM/HW-friendly lightweight client application for threshold ECDSA☆16Jan 19, 2021Updated 5 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- 😈 Demonstration how to manipulate VRF randomness of Chainlink☆29Jan 22, 2021Updated 5 years ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆22May 6, 2019Updated 6 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- ☆27Oct 18, 2022Updated 3 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- Scriptless atomic cross-chain (and cross-curve) swap protocol based on a fair exchange of secrets.☆34Jan 19, 2021Updated 5 years ago
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- Elliptic Curve Implementation in Solidity☆25Feb 3, 2024Updated 2 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Demo / PoC / implementation of IOHK MPC protocols☆20Nov 16, 2018Updated 7 years ago
- Threshold BLS signatures in Rust☆77Nov 17, 2021Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Benchmarking Polynomial Commitments☆51Jul 3, 2023Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated 2 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago