miha-stopar / crypto-notesLinks
Notes on cryptographic schemes and attacks
☆25Updated 6 years ago
Alternatives and similar repositories for crypto-notes
Users that are interested in crypto-notes are comparing it to the libraries listed below
Sorting:
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 5 years ago
- Falcon signature and its ZKP extensions☆20Updated 2 years ago
- ☆25Updated 3 months ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆67Updated 2 years ago
- ☆39Updated 3 months ago
- lattice-based zkSNARKs over libsnark [ISW21]☆32Updated 7 months ago
- Witness encryption for KZG openings☆26Updated 6 months ago
- A basic implementation of Yao's Garbled Circuits☆28Updated 3 years ago
- elliptic curve construction tool☆17Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- An implementation of ZKBoo☆33Updated 3 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- A Rust library for proof-carrying disclosures☆20Updated last year
- ☆22Updated 5 months ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 4 years ago
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆26Updated last year
- Pointcheval Sanders signature☆27Updated 5 years ago
- ☆26Updated 2 years ago
- Elliptic curve search experiments☆35Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆14Updated 5 months ago
- FS-DKR: One Round Distributed Key Rotation☆33Updated last year
- Reference repository on Lattice-based Cryptography☆24Updated 7 months ago
- ☆17Updated last year
- polynomial commitments from linear codes☆44Updated 5 months ago
- A proof-of-concept implementation of KiloNova☆11Updated 7 months ago
- Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.☆44Updated 7 months ago
- Implementation of the ZKB++ proof system☆19Updated 6 years ago
- Banquet implementation☆13Updated 3 years ago
- Code for zero-knowledge middleboxes☆62Updated 2 years ago