rozbb / ct-merkleLinks
An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)
☆36Updated 3 months ago
Alternatives and similar repositories for ct-merkle
Users that are interested in ct-merkle are comparing it to the libraries listed below
Sorting:
- An implementation of ZKBoo☆33Updated 3 years ago
- Rust-libp2p transport for {t,n}-threshold signature schemes☆34Updated 3 years ago
- Argument systems for inner pairing products☆42Updated 11 months ago
- FS-DKR: One Round Distributed Key Rotation☆33Updated last year
- A library for decentralized private computation☆19Updated 3 years ago
- Rust 256-bit unsigned integers.☆9Updated 2 years ago
- A minimal RedJubjub implementation for use in Zebra.☆28Updated 2 months ago
- Intel assembly finite field library generator☆12Updated last year
- decaf377 is a prime-order group designed for use in SNARKs over BLS12-377☆17Updated 4 months ago
- This library is archived; see crypto-primities for the latest version of this code☆23Updated 2 years ago
- Sparse MerkleTree implementation in Rust☆19Updated 5 years ago
- R1CS constraints for non-native field arithmetic☆21Updated 3 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- fft impl for ff::Field☆16Updated last year
- Driver for round-based protocols in Rust☆24Updated last year
- Ed25519 suitable for use in consensus-critical contexts.☆48Updated 11 months ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆15Updated 5 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 4 years ago
- Fully-compatible implementation of Privacy Pass in Rust.☆35Updated 5 years ago
- Rust library for practical time-lock encryption using `drand` threshold network☆40Updated 2 years ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Updated last year
- ☆14Updated 6 years ago
- ☆26Updated 2 years ago
- ☆32Updated 3 years ago
- Traits and utilities for working with finite fields☆18Updated 10 months ago
- ☆17Updated last year
- RLN wrappers and implementation in Go☆11Updated 3 years ago
- Experiments for "Goldfish: No More Attacks on Proof-of-Stake Ethereum"☆13Updated 2 years ago
- Simplified ed25519 BIP32 derivations☆24Updated last year
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 3 years ago