resource exhaustion vulnerabilities in PoSv3 cryptocurrencies
☆24Apr 27, 2022Updated 3 years ago
Alternatives and similar repositories for i-cant-believe-its-not-stake
Users that are interested in i-cant-believe-its-not-stake are comparing it to the libraries listed below
Sorting:
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- ☆15May 27, 2021Updated 4 years ago
- Elliptic Curve Implementation in Solidity☆26Feb 3, 2024Updated 2 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- Rust implementation of Bitcoin p2p protocol.☆29Aug 11, 2023Updated 2 years ago
- A PoC implementation of a multiparty vault architecture☆29Jan 31, 2021Updated 5 years ago
- Barreto-Naehrig curve implementation and BLS☆33Oct 16, 2018Updated 7 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆30Apr 18, 2019Updated 6 years ago
- Submission site for 2018Q2 Zcash Foundation grant proposals.☆26Apr 27, 2018Updated 7 years ago
- The tool for creating a threshold BLS key in a trustless manner.☆29Apr 24, 2023Updated 2 years ago
- Rust implementation of libbolt☆72Dec 10, 2019Updated 6 years ago
- Learning how to bulletproofs☆38Dec 22, 2018Updated 7 years ago
- Solidity library to parse raw Bitcoin transaction bytes☆33May 7, 2017Updated 8 years ago
- AZTEC protocol specification☆31Feb 12, 2020Updated 6 years ago
- Open Management Plane Software☆11Oct 17, 2024Updated last year
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Feb 9, 2018Updated 8 years ago
- Rust library for practical time-lock encryption using `drand` threshold network☆41Dec 24, 2022Updated 3 years ago
- Bitcoin-and-Other-Crypto-Assets-Tracing/Recovery☆11Sep 5, 2022Updated 3 years ago
- Bitcoin Light Client on Ethereum☆42Jun 21, 2024Updated last year
- Find bitcoin network, cluster it, and visualize it.☆10Jul 24, 2015Updated 10 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- C++ wrappers around the cryptography library libsodium and high level API☆44Aug 12, 2017Updated 8 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Simple BCH addresses translator☆13Mar 8, 2023Updated 3 years ago
- VDF competition instructions, and simple implementation☆87Jan 18, 2023Updated 3 years ago
- ☆19Nov 30, 2022Updated 3 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- ☆11Jul 15, 2021Updated 4 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- An ERC6551 account controlled by the wearer(s) of a hat☆10Jun 20, 2024Updated last year
- Basic Identity Token: A login w/ fb button for web3.0 dapps☆11Oct 31, 2018Updated 7 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 3 months ago