RSA blind signatures in Rust
☆31Feb 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for rust-blind-rsa-signatures
Users that are interested in rust-blind-rsa-signatures are comparing it to the libraries listed below
Sorting:
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Challenge Bypass using the Ristretto group☆37Feb 20, 2026Updated 2 weeks ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- A library for decentralized private computation☆19Jul 21, 2021Updated 4 years ago
- ☆25Aug 9, 2022Updated 3 years ago
- MacTok is a research prototype for a one-time anonymous token scheme based on algebraic MACs.☆23Jan 20, 2023Updated 3 years ago
- dalek-compatible implementation of the merlin transcript protocol☆28Feb 11, 2020Updated 6 years ago
- A compatibility guide for Bitcoin wallets☆11Mar 28, 2023Updated 2 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆47Updated this week
- Multibase in rust☆53Feb 12, 2026Updated 3 weeks ago
- Arkworks made simple for us: the non cryptographer software plumbers☆25Feb 8, 2023Updated 3 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated 2 years ago
- ECC based blind signatures in Rust☆14Jun 20, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- ☆11Nov 19, 2019Updated 6 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- ☆12Nov 11, 2022Updated 3 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Some tools to inspect the lightning network☆15Jan 7, 2022Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Sparse Merkle Tree☆14May 6, 2023Updated 2 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago