ShangMi SM2 SM3 SM4 SM9 in JavaScript
☆44Dec 29, 2022Updated 3 years ago
Alternatives and similar repositories for GmSSL-JS
Users that are interested in GmSSL-JS are comparing it to the libraries listed below
Sorting:
- golang implements for BIP32-Ed25519☆13Mar 1, 2026Updated 3 weeks ago
- 记录音视频学习过程☆14Feb 26, 2024Updated 2 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- go implementation of anchorhash☆15Nov 19, 2020Updated 5 years ago
- ECIES on Twisted Edwards Curve25519 using AES-GCM and HKDF-SHA256☆34Jan 1, 2025Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 9 months ago
- ☆10Aug 8, 2022Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Rust multihash implementation☆16Oct 1, 2020Updated 5 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 6 years ago
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- ☆12Jan 24, 2023Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Sparse Merkle Tree☆14May 6, 2023Updated 2 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Curated list of rollups on Ethereum and their security guarantees.☆13Feb 3, 2021Updated 5 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- The Trinity client for the Eth2 network☆15Aug 25, 2020Updated 5 years ago
- A pure rust implementation of Arcturus proofs for confidential transactions.☆12Sep 28, 2025Updated 5 months ago
- Implementation of go-libp2p-record in JavaScript☆16Jul 21, 2023Updated 2 years ago