Elliptic curve Go reference implementation
☆26Feb 5, 2025Updated last year
Alternatives and similar repositories for tozan-ecc
Users that are interested in tozan-ecc are comparing it to the libraries listed below
Sorting:
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆14May 25, 2020Updated 5 years ago
- Alternative implementation of the contributor-client for the Ethereum KZG Trusted Setup Ceremony☆15Jan 28, 2023Updated 3 years ago
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Dec 8, 2022Updated 3 years ago
- ☆34Feb 2, 2023Updated 3 years ago
- dalek-compatible implementation of the merlin transcript protocol☆28Feb 11, 2020Updated 6 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- ☆11Nov 19, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 3 months ago
- ☆10Aug 8, 2022Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- RSA blind signatures in Rust☆31Feb 23, 2026Updated last week
- ☆12Sep 6, 2020Updated 5 years ago
- KEY ID contracts on Ethereum☆13Feb 22, 2026Updated last week
- Curated list of rollups on Ethereum and their security guarantees.☆13Feb 3, 2021Updated 5 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 9 months ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- ☆12May 7, 2021Updated 4 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Sparse Merkle Tree☆14May 6, 2023Updated 2 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago