cryptography-cafe / ed25519-elisabethLinks
Pure Java implementation of Ed25519
☆21Updated 2 years ago
Alternatives and similar repositories for ed25519-elisabeth
Users that are interested in ed25519-elisabeth are comparing it to the libraries listed below
Sorting:
- Pure Java implementation of group operations on ristretto255 and Curve25519☆28Updated 2 years ago
- A method to deploy a quarantined zcashd testnet with monitoring.☆16Updated 4 years ago
- ☆13Updated last month
- Random collection of zero-knowledge stuff☆14Updated 7 years ago
- Blind signatures over secp256k1 elliptic curve☆17Updated 3 years ago
- A command line tool and shell to manage keycards☆54Updated last month
- C bindings over RUST sr25519 https://github.com/w3f/schnorrkel☆31Updated 3 years ago
- ShareLock: mixing for cryptocurrencies from multiparty ECDSA☆51Updated 3 years ago
- Collection of ZKP-related cryptographic primitives☆12Updated 4 years ago
- Verify your NIPoPoWs efficiently, here☆11Updated 3 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- Zcash Sapling Paper Wallet Generator☆43Updated last year
- sha256(sha256(preimage)) in zk☆15Updated 4 years ago
- ☆15Updated 6 years ago
- ☆10Updated 3 years ago
- Zepio | ZEC Wallet☆41Updated 5 years ago
- ☆18Updated last year
- An example usage as a standalone CLI of https://github.com/KZen-networks/multi-party-ecdsa library which is a Rust implementation of {t,n…☆39Updated 4 months ago
- Grin transaction data corresponding to research on transaction linkability☆53Updated 6 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- Sputnik is an assembly language and interpreter for Fully Homomorphic Encryption☆27Updated 7 years ago
- Java SDK for the Status Keycard☆22Updated this week
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Updated 5 years ago
- ☆27Updated 5 years ago
- zkSNARK full flow example in Go☆12Updated 5 years ago
- Specification of the RenVM MPC algorithm☆19Updated 5 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Updated 5 years ago
- Sample implementation of NSEC5 cryptography☆23Updated 7 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Updated 7 years ago
- The public key cryptography framework☆11Updated 8 years ago