Audit Proposals and Reports for RandomX
☆12Aug 3, 2019Updated 6 years ago
Alternatives and similar repositories for RandomxAudits
Users that are interested in RandomxAudits are comparing it to the libraries listed below
Sorting:
- Enabling NIPoPoW Applications on Bitcoin Cash☆20Mar 22, 2020Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 7 months ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- A coinjoin implementation for the Enigma Discovery network☆16Feb 6, 2020Updated 6 years ago
- ☆17Feb 13, 2023Updated 3 years ago
- ☆19Jan 20, 2023Updated 3 years ago
- ☆19Apr 1, 2024Updated last year
- A method to deploy a quarantined zcashd testnet with monitoring.☆16Jul 29, 2021Updated 4 years ago
- Chosen-Prefix Collision Attack Against SHA-1 Hash Function☆17Feb 17, 2020Updated 6 years ago
- Advanced functionality for ERC20 tokens, as abstract inheritable contracts☆20Jan 24, 2023Updated 3 years ago
- EraVM implementation☆19Sep 5, 2024Updated last year
- ☆20Jul 10, 2025Updated 7 months ago
- ☆23May 29, 2020Updated 5 years ago
- Anonymous decentralized message broadcasting based on Libp2p and Dandelion++☆18Apr 12, 2020Updated 5 years ago
- Profile Solidity gas consumption line-wise.☆23Jun 1, 2021Updated 4 years ago
- Hyperledger Fabric跨链适配器☆18Mar 5, 2024Updated last year
- FRI low-degree-testing & polynomial commitment scheme☆24Mar 26, 2023Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- This repository collects lecture notes on Cryptography that are publicly accessible.☆28Jan 25, 2022Updated 4 years ago
- Grin transaction data corresponding to research on transaction linkability☆53Dec 23, 2019Updated 6 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- A ziglang implementation of the SSZ serialization protocol☆31Updated this week
- zDai.io - confidential Dai transactions on Burner wallet☆29Mar 2, 2019Updated 6 years ago
- Some tips for new learners of ZKP☆28Dec 31, 2020Updated 5 years ago
- Circom arithmetic circuits and concepts explained, in depth.☆31May 26, 2025Updated 9 months ago
- ☆37Oct 14, 2024Updated last year
- Bitcoin sidechain module for Lotion and Coins (A Cosmos Bitcoin peg zone implementation)☆72May 9, 2021Updated 4 years ago
- Nova-based SHA256 benchmarks☆31Jun 7, 2025Updated 8 months ago
- Threshold Logical Clocks and Que Sera Consensus☆28Jul 27, 2023Updated 2 years ago
- AZTEC protocol trusted setup MPC☆33Jun 25, 2024Updated last year
- Novel zero-knowledge proof based social recovery of smart contract wallets☆34Jan 24, 2023Updated 3 years ago
- Prototype Rust implementation of hash-based signatures. See https://eprint.iacr.org/2025/055.pdf☆47Dec 18, 2025Updated 2 months ago
- Using folding schemes for a provable bitcoin light client☆34May 22, 2024Updated last year
- Solidity verifier for Plonk☆42Aug 15, 2024Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆12Apr 8, 2025Updated 10 months ago