penumbra-zone / decaf377Links
decaf377 is a prime-order group designed for use in SNARKs over BLS12-377
☆17Updated 6 months ago
Alternatives and similar repositories for decaf377
Users that are interested in decaf377 are comparing it to the libraries listed below
Sorting:
- Composable proof transcripts for public-coin arguments of knowledge☆49Updated last year
- This library is archived; see crypto-primities for the latest version of this code☆22Updated 2 years ago
- Ed25519 suitable for use in consensus-critical contexts.☆50Updated last year
- Rust-libp2p transport for {t,n}-threshold signature schemes☆34Updated 3 years ago
- A standard library wrapper for use in the `arkworks` ecosystem☆42Updated last week
- Argument systems for inner pairing products☆43Updated last year
- Designatived verifier Schnorr signatures☆13Updated 2 years ago
- ☆24Updated 2 years ago
- An instantiation of the Poseidon hash for use with decaf377☆29Updated 7 months ago
- Tower-based ABCI interface.☆78Updated 8 months ago
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆58Updated 2 years ago
- An async-friendly sparse merkle tree implementation based on Diem's Jellyfish Merkle Tree☆62Updated 5 months ago
- Rust implementation for zcash/pasta☆83Updated 5 months ago
- A minimal RedDSA implementation for use in Zebra and zcashd.☆12Updated last week
- Fully-compatible implementation of Privacy Pass in Rust.☆35Updated 5 years ago
- Elliptic curve group traits and utilities.☆95Updated 5 months ago
- Diffie-Hellman key exchange using the Ristretto255 group, in Rust.☆22Updated 2 years ago
- Implementation of the Hades permutation algorithm used in Poseidon Hashes with ZKProof capabilities.☆22Updated last year
- A trust-minimized cross-chain execution environment.☆14Updated this week
- Rust library for accumulation schemes☆24Updated 2 years ago
- Coded Merkle Tree☆26Updated 6 years ago
- Fawkes-Crypto - zkSNARKs framework☆22Updated last year
- ☆18Updated last year
- A generalized merkle mountain range implementation.☆60Updated 6 months ago
- Vectorized AVX-512 256-bit arithmetic library☆34Updated last year
- Implementations of proof-carrying data☆35Updated 3 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆36Updated 5 months ago
- ☆27Updated 2 years ago
- sha256(sha256(preimage)) in zk☆14Updated 4 years ago
- Implementation of the Jubjub elliptic curve group☆122Updated last year