cryptography-cafe / ed25519-elisabethLinks
Pure Java implementation of Ed25519
☆20Updated 2 years ago
Alternatives and similar repositories for ed25519-elisabeth
Users that are interested in ed25519-elisabeth are comparing it to the libraries listed below
Sorting:
- Pure Java implementation of group operations on ristretto255 and Curve25519☆28Updated 2 years ago
- C bindings over RUST sr25519 https://github.com/w3f/schnorrkel☆31Updated 3 years ago
- ☆13Updated last month
- A method to deploy a quarantined zcashd testnet with monitoring.☆16Updated 4 years ago
- Zcash Sapling Paper Wallet Generator☆42Updated last year
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- Random collection of zero-knowledge stuff☆14Updated 7 years ago
- A command line tool and shell to manage keycards☆54Updated last month
- Blind signatures over secp256k1 elliptic curve☆17Updated 3 years ago
- ☆11Updated 7 years ago
- Grin transaction data corresponding to research on transaction linkability☆53Updated 5 years ago
- Zcash "Sapling" cryptography☆87Updated 3 months ago
- A client for managing Decentralized Identifiers☆44Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago
- Zepio | ZEC Wallet☆41Updated 5 years ago
- RWOT8 in Barcelona, Spain (March 2019)☆130Updated 3 years ago
- The project page of ZeroWallet☆19Updated 6 years ago
- Submission site for 2018Q2 Zcash Foundation grant proposals.☆26Updated 7 years ago
- Proof of Device☆21Updated 2 years ago
- Specification of the RenVM MPC algorithm☆19Updated 5 years ago
- ☆60Updated 8 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- sha256(sha256(preimage)) in zk☆14Updated 4 years ago
- Hierarchical derivations on Ed25519☆26Updated 4 years ago
- BLS working standard draft☆39Updated 6 years ago
- ZkVM — a blockchain virtual machine with cloaked assets and ZK smart contracts☆43Updated 6 years ago
- ShareLock: mixing for cryptocurrencies from multiparty ECDSA☆51Updated 2 years ago
- Sample implementation of NSEC5 cryptography☆23Updated 7 years ago
- this implements verifiable secret sharing☆41Updated 2 years ago
- Verify your NIPoPoWs efficiently, here☆11Updated 2 years ago