apoelstra / taproot
Taproot security proof
☆23Updated 5 years ago
Alternatives and similar repositories for taproot:
Users that are interested in taproot are comparing it to the libraries listed below
- Simple implementation of Bitcoin CoinSwap, client-server☆32Updated 6 years ago
- My poster for Financial Crypto 2020 analysing the hash function requirements for Taproot to be secure in the generic group model.☆11Updated 4 years ago
- A PoC implementation of a multiparty vault architecture☆29Updated 3 years ago
- A detailed description of how Bitcoin Elements Alpha Confidential Transactions works☆58Updated 6 years ago
- Fast additive accumulators☆14Updated 4 years ago
- Naive implementation of ROAST protocol for robust threshold signatures☆31Updated 4 months ago
- Experiments in a improving Bitcoin using a Directed Acyclic Graph instead of a chain☆38Updated last year
- proof of concept that creates a ring signature over all taproot outputs in the UTXO set☆58Updated 4 years ago
- Onchain security and performance analysis of Bitcoin's second-layer protocols☆43Updated 3 years ago
- ☆14Updated 5 years ago
- Temporary repository for systemizing Bitcoin knowledge.☆21Updated 9 years ago
- A community R&D process about covenants, transaction introspections and new class of Bitcoin contracting applications☆37Updated last year
- A wiki for the Lightning Network and Lightning Network ecosystem☆29Updated 2 years ago
- Documentation about scriptless scripts☆11Updated 2 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆18Updated 4 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆25Updated 4 years ago
- p2p based txindex for Bitcoin☆45Updated 6 years ago
- Efficient compression of Bitcoin's header chain☆12Updated 5 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Updated 2 years ago
- See https://github.com/lightningdevkit/ldk-sample instead.☆35Updated 4 years ago
- Wasabi Research Club☆41Updated last year
- ABANDONED delineator of pseudonymous payment sets☆13Updated last month
- Give LND's watchtowers a shot with your own simulated channel breach☆16Updated 5 years ago
- ☆58Updated this week
- sign-to-contract: how to achieve trustless digital timestamping with zero marginal cost☆12Updated 6 years ago
- Schnorr related examples (Schnorr, BN, MuSig, discreet log contracts)☆36Updated 6 years ago
- Proof-of-Reserves tool for Bitcoin☆48Updated last year
- Documentation about scriptless scripts☆163Updated this week
- A python script computing the entropy of Bitcoin transactions and the linkability of their inputs and outputs.☆72Updated 4 years ago