miguelmarco / ZcashPannel
An android front-end to the zcash wallet through onion services
☆13Updated 7 years ago
Alternatives and similar repositories for ZcashPannel:
Users that are interested in ZcashPannel are comparing it to the libraries listed below
- Deterministic build environment for Zcash☆19Updated 5 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- Submission site for Zcash Foundation grant proposals☆25Updated 6 years ago
- ☆10Updated 7 years ago
- Zcash Vanity Address Generator☆22Updated 3 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 7 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 4 years ago
- Ethereum key generator☆33Updated 7 years ago
- ☆24Updated 3 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- A Decentralized Vulnerability Management☆9Updated 9 years ago
- Dr. Y's Ethereum Contract Analyzer☆42Updated 2 years ago
- A malicious cryptocurrency☆50Updated 8 years ago
- Temporary repository for systemizing Bitcoin knowledge.☆22Updated 9 years ago
- free crypto audit☆31Updated 7 years ago
- Sign and verify author signatures on git commits☆17Updated 10 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 8 years ago
- Replicating Encrypted PasteBin☆74Updated 7 years ago
- Experiments in a improving Bitcoin using a Directed Acyclic Graph instead of a chain☆39Updated last year
- A user-first approach to threat modeling.☆16Updated 5 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 6 years ago
- Technical paper on the Borromean ring signature construction☆47Updated 7 years ago
- A small program for sending messages via zcash encrypted memo fields☆98Updated 7 years ago
- axolotl based on libsodium☆22Updated 8 years ago