☆17Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for mpc-ecdsa-attacks-23
Users that are interested in mpc-ecdsa-attacks-23 are comparing it to the libraries listed below
Sorting:
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- z3++☆29Dec 14, 2024Updated last year
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Open source solver to the batch auction problem.☆13Feb 16, 2021Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- ☆12Aug 6, 2023Updated 2 years ago
- Oracle feeder service (presently supporting Terra)☆14Jan 23, 2023Updated 3 years ago
- implentation of Ligerito☆19Nov 9, 2025Updated 3 months ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- An instantiation of the Poseidon hash for use with decaf377☆29Mar 6, 2025Updated last year
- FS-DKR: One Round Distributed Key Rotation☆34Oct 20, 2023Updated 2 years ago
- ☆30Sep 2, 2021Updated 4 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- ☆15May 27, 2021Updated 4 years ago
- IPC implementation atop CometBFT☆17Jan 11, 2024Updated 2 years ago
- Configurable Asset Privacy☆34Jan 11, 2024Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- An implementation of a threshold ECDSA signature scheme☆17Feb 11, 2025Updated last year
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Permanently burn ETH by self destructing a contract while sending funds to itself☆14Jun 27, 2021Updated 4 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Multi Party Key Management System (KMS) for Secp256k1 Elliptic curve based digital signatures.☆71Nov 2, 2023Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- An implementation of RSA extending Wiener attack☆16Dec 28, 2021Updated 4 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- ☆17May 13, 2021Updated 4 years ago
- A method to deploy a quarantined zcashd testnet with monitoring.☆16Jul 29, 2021Updated 4 years ago
- Decentralised Voting Scheme☆16Dec 5, 2021Updated 4 years ago
- Solidity implementation of the baby jubjub curve☆21Apr 30, 2024Updated last year
- ☆16Feb 22, 2023Updated 3 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Paillier cryptosystem implemented in Go☆21Nov 10, 2023Updated 2 years ago
- ☆44Feb 28, 2023Updated 3 years ago