Malicious Two Party Computation Based on Garbled Circuits.
☆12Sep 5, 2020Updated 5 years ago
Alternatives and similar repositories for emp-m2pc
Users that are interested in emp-m2pc are comparing it to the libraries listed below
Sorting:
- ☆21Oct 14, 2022Updated 3 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆82Nov 13, 2025Updated 3 months ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆23May 6, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 7 months ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- ☆241Nov 13, 2025Updated 3 months ago
- Oracle feeder service (presently supporting Terra)☆14Jan 23, 2023Updated 3 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Cryptographic protocols for Solidity.☆13Aug 6, 2017Updated 8 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆33Nov 13, 2025Updated 3 months ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- ☆15May 27, 2021Updated 4 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- A library for supporting zk-SNARKs to Substrate☆29Jun 23, 2022Updated 3 years ago
- one of many proofs, ring signatures, and zerocoin algo from https://eprint.iacr.org/2014/764.pdf☆15Dec 12, 2022Updated 3 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- Confidential Transactions with Reusable Commitments on Ethereum☆17Mar 16, 2020Updated 5 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Jan 25, 2021Updated 5 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- ☆13Mar 23, 2018Updated 7 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆182Nov 13, 2025Updated 3 months ago
- Solidity implementation of the baby jubjub curve☆21Apr 30, 2024Updated last year
- Decentralised Voting Scheme☆16Dec 5, 2021Updated 4 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- Paillier cryptosystem implemented in Go☆21Nov 10, 2023Updated 2 years ago
- Go package to connect to Ledger devices☆19Aug 22, 2025Updated 6 months ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- ☆18Oct 7, 2023Updated 2 years ago
- An implementation of ZEXE on Ethereum☆36Apr 11, 2019Updated 6 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Apache-2 licensed common Ethereum structs shared by crates☆21Oct 25, 2019Updated 6 years ago
- ☆21Jun 28, 2022Updated 3 years ago