kayabaNerve / threshold-threshold-ecdsaLinks
☆16Updated 2 years ago
Alternatives and similar repositories for threshold-threshold-ecdsa
Users that are interested in threshold-threshold-ecdsa are comparing it to the libraries listed below
Sorting:
- FROST Signing Protocol for BIP340 Signatures☆22Updated last week
- A STARK proof of Bitcoin's header chain☆42Updated last year
- Implementation of bulletproofs++ in rust☆18Updated 2 years ago
- Fun with MuSig2 and Ledger devices 🎵☆11Updated 7 months ago
- ☆31Updated 10 months ago
- Bitcoin Script interpreter implemented in Rust☆53Updated 2 months ago
- Simple Schnorr Multi-Signatures☆30Updated 2 years ago
- Gadgets for covenants: Schnorr trick and txid reflection☆16Updated 9 months ago
- Examples of covenants in Bitcoin script☆15Updated last year
- Powering Verifiable Computation for Nostr Data Vending Machines.☆25Updated last year
- Arithmetic over the M31 or BabyBear field in Bitcoin Script☆25Updated last year
- ☆36Updated last year
- ☆43Updated last year
- STARK verifier written in SimplicityHL language☆19Updated 4 months ago
- Bitcoin DSL for scripting layer two contracts and interactions with bitcoin nodes☆20Updated last year
- ☆30Updated 8 months ago
- Naive implementation of ROAST protocol for robust threshold signatures☆33Updated last year
- STARK-proven Stateful Bitcoin client enabling hyper fast trustless sync and checkpoints.☆53Updated 3 years ago
- Bulletproofs++: Even Shorter Range Proofs☆31Updated 3 years ago
- Flexible Rust implementation of the MuSig2 multisignature protocol, compatible with Bitcoin.☆39Updated 3 weeks ago
- Learn how to develop bitvm apps by building tic tac toe☆16Updated last year
- What are the limits of Bitcoin Script?☆47Updated 3 weeks ago
- Summary of mempool design, challenges, and proposals (re: fees)☆41Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 6 years ago
- Helper lib to write complex bitcoin scripts☆21Updated 2 months ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- Protocols that use simple covenants to scale Lightning☆19Updated 2 years ago
- ☆25Updated 2 years ago
- Explore the world of zero-knowledge proofs from first principles.☆47Updated 6 months ago
- ☆64Updated last week