Public working documents (e.g., Internet drafts)
☆26Jun 8, 2018Updated 7 years ago
Alternatives and similar repositories for doc
Users that are interested in doc are comparing it to the libraries listed below
Sorting:
- ☆12May 7, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- A research-only integration of Sovereign with Celestia☆20May 30, 2023Updated 2 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Jul 10, 2020Updated 5 years ago
- Tendermint with an embedded BLS random beacon☆18Dec 11, 2022Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A small and easy to use HPKE implementation in Go.☆20Dec 12, 2024Updated last year
- BLST-Verification☆23Jan 22, 2026Updated last month
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- ☆38Jul 5, 2018Updated 7 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- The Matasano Crypto Challenges in Rust http://cryptopals.com/☆11Nov 5, 2015Updated 10 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- ☆14Mar 2, 2021Updated 4 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Feb 2, 2023Updated 3 years ago
- LazyLedger academic prototype☆50Jun 26, 2020Updated 5 years ago
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆11Jun 14, 2018Updated 7 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Sparse Merkle Tree☆14May 6, 2023Updated 2 years ago