axelarnetwork / tofnLinks
A threshold cryptography library in Rust
☆112Updated 11 months ago
Alternatives and similar repositories for tofn
Users that are interested in tofn are comparing it to the libraries listed below
Sorting:
- A Rust library for building R1CS gadgets☆91Updated 3 years ago
- Zero-knowledge gadgets for Webb's cross-chain blockchain applications.☆93Updated 2 years ago
- Threshold BLS Signatures and DKG☆76Updated last week
- Poseidon hash function☆76Updated 2 years ago
- Threshold ECDSA via Triples☆80Updated last year
- Elliptic curve group traits and utilities.☆96Updated 2 months ago
- ☆112Updated last year
- Rust implementation for zcash/pasta☆83Updated 2 months ago
- Threshold BLS signatures in Rust☆75Updated 3 years ago
- Interfaces and implementations of cryptographic primitives, along with R1CS constraints for them☆214Updated 3 months ago
- R1CS constraints for bits, fields, and elliptic curves☆166Updated this week
- Implementation of Canetti-Gennaro-Goldfeder-Makriyannis-Peled threshold signing scheme☆77Updated this week
- An elastic proof system based on arkworks☆84Updated last year
- A Rust implementation of the Groth16 zkSNARK☆294Updated 3 months ago
- Secure transport for running MPC protocols backed by Signal☆69Updated 4 years ago
- Recursive SNARKs based on Plonk and Halo☆116Updated 3 years ago
- State-of-art threshold ECDSA in Rust☆83Updated this week
- A zkSNARK toolkit to work with circom zkp DSL in plonk proof system.☆160Updated 2 years ago
- ☆123Updated 7 months ago
- Implementation of the Zcash Orchard Protocol☆55Updated last week
- Aggregatable Distributed Key Generation☆46Updated 3 years ago
- ED25519 implementation in Circom☆116Updated last year
- ☆73Updated 2 years ago
- ☆45Updated last month
- BabyJubJub elliptic curve implementation and EdDSA signature scheme in Rust☆43Updated last year
- fast zksnark prover☆120Updated last year
- Implementation of the FROST protocol for threshold Ed25519 signing☆68Updated last year
- Reference implementation for the Poseidon Snark-friendly Hash algorithm.☆215Updated 4 months ago
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆56Updated 2 years ago
- Network layer for MPC (Secure Multi-Party Computation) based on Tendermint☆102Updated 4 years ago