johndoe31415 / toyeccView external linksLinks
Elliptic Curve Cryptography playground/toolkit written in pure Python
☆70Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for toyecc
Users that are interested in toyecc are comparing it to the libraries listed below
Sorting:
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Random collection of zero-knowledge stuff☆15May 20, 2018Updated 7 years ago
- Set of functions for golang verification of zkSNARKs☆31Sep 9, 2018Updated 7 years ago
- R1CS constraints for non-native field arithmetic☆21Aug 7, 2021Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 8 months ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago
- ☆12Sep 6, 2020Updated 5 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- A simple implementation of the Huffman Coding in C☆10Oct 8, 2016Updated 9 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆29Nov 24, 2020Updated 5 years ago
- Twemoji font in COLR/CPAL layered format☆14Nov 20, 2025Updated 2 months ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆15May 25, 2020Updated 5 years ago
- Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 20…☆20Nov 20, 2015Updated 10 years ago
- Related address generator.☆30May 1, 2015Updated 10 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 10 years ago
- Confidential Transactions with Reusable Commitments on Ethereum☆17Mar 16, 2020Updated 5 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- Tools for btc hacking☆12Feb 21, 2021Updated 4 years ago
- Sonic implementation in Rust☆18Jun 4, 2019Updated 6 years ago
- Verkle trees with inner product argument (IPA) based polynomial commitment [Prototype]☆15Mar 26, 2022Updated 3 years ago
- Alternative implementation of the contributor-client for the Ethereum KZG Trusted Setup Ceremony☆15Jan 28, 2023Updated 3 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Feb 9, 2018Updated 8 years ago
- Free, zlib licensed ZX0 decompressor for the x86☆19Nov 17, 2021Updated 4 years ago
- A program for creating and verifying zkSNARKs to prove the results of Orbis smart contract executions and other TinyRAM program execution…☆39Nov 18, 2022Updated 3 years ago
- Arithmetic and polynomial operations in finite fields.☆42Dec 30, 2022Updated 3 years ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- ECDSA encryption☆30Sep 16, 2014Updated 11 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 2 weeks ago
- Python library for fast elliptic curve crypto☆288Jan 6, 2026Updated last month
- Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings☆47Apr 5, 2020Updated 5 years ago
- DEPRECATED☆22Jan 18, 2021Updated 5 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- BLS working standard draft☆40Aug 8, 2019Updated 6 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago