Research and implementation for non-interactive blockchain proofs of proofs of work
☆51Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for popow
Users that are interested in popow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- A physically based offline renderer☆10Jan 7, 2024Updated 2 years ago
- Decentralized monetary trust network☆31Jul 30, 2017Updated 8 years ago
- Investigating the frequency of alternative blocks, reorganizations, potential double-spend attacks, selfish mining, and more.☆14Nov 21, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- ☆26Nov 14, 2017Updated 8 years ago
- An authenticated data structure based on a red-black tree.☆54Jul 27, 2015Updated 10 years ago
- Scriptless atomic cross-chain (and cross-curve) swap protocol based on a fair exchange of secrets.☆34Jan 19, 2021Updated 5 years ago
- ☆14Sep 28, 2020Updated 5 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48May 3, 2019Updated 6 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- Custom tailored continuous integration system based on KVM running on bitcoinbuilds.org☆12Jul 28, 2019Updated 6 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 5 years ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- Specification of the RenVM MPC algorithm☆19May 27, 2020Updated 5 years ago
- Profile Solidity gas consumption line-wise.☆23Jun 1, 2021Updated 4 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- A proposal for a system of decentralized trust, built on an open, public blockchain.☆14Jun 5, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- My Linux configuration files☆22Oct 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Code repository for technical papers about selfish mining analysis.☆13May 16, 2023Updated 2 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Apr 28, 2022Updated 3 years ago
- Example of an ERC20 bridge for tokens minted on StarkNet layer 2☆15Jan 26, 2023Updated 3 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆27Oct 12, 2020Updated 5 years ago
- A specification of the CBC Casper consensus protocols written in TLA+ and PlusCal (transpiled to TLA+)☆20Aug 12, 2019Updated 6 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆29Apr 1, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Compact Proofs of Retrievability☆13May 28, 2014Updated 11 years ago
- Pay for the solution to a sudoku puzzle with a zero-knowledge contingent payment☆103Jul 13, 2017Updated 8 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago