☆10Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for pedersen-commitment
Users that are interested in pedersen-commitment are comparing it to the libraries listed below
Sorting:
- JavaScript bindings of libsecp256k1-zkp with support for pedersen commitments and range proofs.☆16Jan 5, 2024Updated 2 years ago
- Python bindings for a minimal subset of libsnark☆11May 22, 2022Updated 3 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- Merkle Tree implementation in Python☆29May 14, 2020Updated 5 years ago
- Java implementation of Paillier algorithm. This is one of the few known system that preserves additive homomorphic properties. JCA Pailli…☆11Jan 29, 2019Updated 7 years ago
- libsnark: a C++ library for zkSNARK proofs [+ interface for jsnark/Pinocchio ]☆11Dec 17, 2022Updated 3 years ago
- Multi-Authority Policy-based Chameleon Hash☆16Dec 2, 2020Updated 5 years ago
- SuperiorCoin is a secure, private, untraceable currency. Unlike many crypto currencies that are derivatives of Bitcoin, Superior Coin is …☆33Dec 31, 2019Updated 6 years ago
- ☆11Oct 10, 2024Updated last year
- Extensible Service ChAin Prototyping Environment using Mininet, Click, NETCONF and POX☆11Mar 2, 2017Updated 9 years ago
- Garbled circuits in Python☆25Jun 1, 2017Updated 8 years ago
- Simple Merkle Tree implementation built for easy traversal☆21Jan 24, 2024Updated 2 years ago
- Monitor mode on latest devices☆18Jun 16, 2017Updated 8 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- 《zkSNARK实践》中的源码☆18Jun 26, 2022Updated 3 years ago
- Monero hardware wallet protocol implementation for Trezor, agent☆30Feb 5, 2026Updated last month
- Go version of the Pedersen commitment scheme☆15Apr 11, 2020Updated 5 years ago
- Minimal examples to use libsnark.☆21Aug 27, 2020Updated 5 years ago
- WAFFLE: Watermarking in Federated Learning☆23Aug 21, 2023Updated 2 years ago
- A CLI tool for navigating AWS ECS clusters interactively.☆59Updated this week
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆26Apr 7, 2022Updated 3 years ago
- 变色龙哈希☆26May 11, 2021Updated 4 years ago
- ☆10Apr 29, 2020Updated 5 years ago
- Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent (ICLR 2021)☆21May 6, 2021Updated 4 years ago
- Encryption and Descryption example using RSA Algorithm in Java - Asymmetric☆19Sep 1, 2020Updated 5 years ago
- A comprehensive Fallout 4 modding guide.☆56Mar 6, 2026Updated 2 weeks ago
- Implementation of perdersen commitments in node.js and solidity☆24Apr 16, 2018Updated 7 years ago
- Learning how to bulletproofs☆38Dec 22, 2018Updated 7 years ago
- ☆21Mar 12, 2023Updated 3 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Nov 14, 2021Updated 4 years ago
- Merkle trees for easier data verification.☆50Apr 24, 2024Updated last year
- This folder contains a short implementation of Merkle Tree. Using the SHA-256 hash function.☆49Aug 26, 2019Updated 6 years ago
- Python-based system for zk-SNARK based verifiable computations and smart contracts☆84Sep 17, 2019Updated 6 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- A simple plugin for retrying flaky tests in CI environments☆40Jan 19, 2025Updated last year
- ☆26Jan 29, 2017Updated 9 years ago
- pure python tls 1.3 implementation☆42Apr 7, 2020Updated 5 years ago
- A Cython library to solve the Bittensor registration POW on CUDA☆15Aug 15, 2025Updated 7 months ago
- Simple script to re-rank images using OpenAI's CLIP https://github.com/openai/CLIP.☆15May 3, 2021Updated 4 years ago