JHU Advanced Topics in Applied Cryptography (601.745)
☆53Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for cryptoengineering
Users that are interested in cryptoengineering are comparing it to the libraries listed below
Sorting:
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Library for the verification of BGLS signatures on the EVM using Solidity.☆15Mar 14, 2018Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆14May 25, 2020Updated 5 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Jan 25, 2021Updated 5 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- evm playground - optimizations, patterns and bytecode decoding☆15Dec 29, 2022Updated 3 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- Sparse MerkleTree implementation in Rust☆19Oct 16, 2019Updated 6 years ago
- Tendermint with an embedded BLS random beacon☆18Dec 11, 2022Updated 3 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆30Apr 18, 2019Updated 6 years ago
- Low-level X.509 verification☆20Jun 25, 2021Updated 4 years ago
- This library is archived; see crypto-primities for the latest version of this code☆21Feb 15, 2023Updated 3 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last week
- ☆17Aug 2, 2021Updated 4 years ago
- Presentations about R1CS☆19May 1, 2019Updated 6 years ago
- ☆78Dec 10, 2019Updated 6 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Like shasum but for blake2b☆13Nov 8, 2018Updated 7 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- ☆10Sep 25, 2020Updated 5 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- ☆12Nov 11, 2022Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- ZSLBox offers some grpc endpoints to generate and verify proofs "à la ZCash": shielding, unshielding and shielded transfers.☆19Oct 2, 2018Updated 7 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A substrate pallet that enables Manta's decentialized anynonymous payment (MantaPay) protocol.☆28Mar 2, 2022Updated 3 years ago