Implements the Barreto-Naehrig (BN) curve as used by Ethereum
☆12May 31, 2019Updated 6 years ago
Alternatives and similar repositories for bn256
Users that are interested in bn256 are comparing it to the libraries listed below
Sorting:
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Apr 16, 2021Updated 4 years ago
- ☆19May 5, 2020Updated 5 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Jan 28, 2025Updated last year
- A Tendermint p2p crawling utility and API.☆20Jan 20, 2020Updated 6 years ago
- Elliptic Curve Implementation in Solidity☆26Feb 3, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Pairing-friendly elliptic curve library☆24Aug 15, 2024Updated last year
- A private P2P CDN☆13Apr 10, 2019Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- A very simple router to exchange tokens for the best price on any UniswapV2 like AMM.☆14Aug 31, 2021Updated 4 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11May 3, 2024Updated last year
- ☆10Oct 2, 2021Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- research on privacy and security in p2p and decentralised systems☆52Jun 28, 2020Updated 5 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- ☆12May 7, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago