Fast, small and secure Shamir's Secret Sharing library crate
☆66Oct 23, 2023Updated 2 years ago
Alternatives and similar repositories for sharks
Users that are interested in sharks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust bindings for my Shamir secret sharing library☆50Oct 26, 2025Updated 6 months ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆29Aug 14, 2024Updated last year
- PVSS & Scrape in rust☆11Apr 6, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆13May 25, 2020Updated 5 years ago
- ☆32Nov 2, 2025Updated 6 months ago
- Low-level X.509 verification☆20Jun 25, 2021Updated 4 years ago
- 🔑 Threshold Shamir's secret sharing in Rust☆270Aug 15, 2024Updated last year
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆20May 10, 2020Updated 5 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Apr 14, 2026Updated 2 weeks ago
- Plonky2 gadgets for EcGFp5 curve and base field arithmetic☆20Feb 19, 2023Updated 3 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Rust multihash implementation☆16Oct 1, 2020Updated 5 years ago
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 7 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- ☆62Updated this week
- Timer Wheels With Various Runtimes In Rust☆15Nov 29, 2017Updated 8 years ago
- A Rust implementation of the Handshake and Lightning Network secure messaging protocol - based on Noise.☆12Dec 9, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 5 months ago
- ☆22Oct 3, 2022Updated 3 years ago
- a simple implementation of the KZG polynomial commitment scheme☆25Nov 22, 2021Updated 4 years ago
- Fawkes-Crypto - zkSNARKs framework☆21Feb 6, 2024Updated 2 years ago
- A library for supporting zk-SNARKs to Substrate☆29Jun 23, 2022Updated 3 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆14Sep 28, 2020Updated 5 years ago
- zkSNARKs as a service using secure multi-party computation.☆30Jan 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Verifiable Secret Sharing Schemes☆93Apr 24, 2026Updated last week
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆30Nov 24, 2020Updated 5 years ago