Research and implementation for non-interactive blockchain proofs of proofs of work
☆51Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for popow
Users that are interested in popow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- A physically based offline renderer☆10Jan 7, 2024Updated 2 years ago
- Decentralized monetary trust network☆31Jul 30, 2017Updated 8 years ago
- Investigating the frequency of alternative blocks, reorganizations, potential double-spend attacks, selfish mining, and more.☆14Nov 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- ☆26Nov 14, 2017Updated 8 years ago
- An authenticated data structure based on a red-black tree.☆54Jul 27, 2015Updated 10 years ago
- Scriptless atomic cross-chain (and cross-curve) swap protocol based on a fair exchange of secrets.☆34Jan 19, 2021Updated 5 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48May 3, 2019Updated 6 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- Custom tailored continuous integration system based on KVM running on bitcoinbuilds.org☆12Jul 28, 2019Updated 6 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 5 years ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- Specification of the RenVM MPC algorithm☆19May 27, 2020Updated 5 years ago
- Profile Solidity gas consumption line-wise.☆23Jun 1, 2021Updated 4 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- A proposal for a system of decentralized trust, built on an open, public blockchain.☆14Jun 5, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- My Linux configuration files☆22Oct 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Code repository for technical papers about selfish mining analysis.☆13May 16, 2023Updated 2 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Apr 28, 2022Updated 3 years ago
- Example of an ERC20 bridge for tokens minted on StarkNet layer 2☆15Jan 26, 2023Updated 3 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆27Oct 12, 2020Updated 5 years ago
- A specification of the CBC Casper consensus protocols written in TLA+ and PlusCal (transpiled to TLA+)☆20Aug 12, 2019Updated 6 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆29Apr 1, 2021Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Compact Proofs of Retrievability☆13May 28, 2014Updated 11 years ago
- Pay for the solution to a sudoku puzzle with a zero-knowledge contingent payment☆103Jul 13, 2017Updated 8 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago