rozbb / fujisaki-ringsig
Fujisaki-Suzuki Ring Signatures in Rust
☆19Updated 4 years ago
Alternatives and similar repositories for fujisaki-ringsig:
Users that are interested in fujisaki-ringsig are comparing it to the libraries listed below
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 6 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 4 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Updated 2 years ago
- a CCA-secure module-lattice-based KEM☆16Updated 6 years ago
- Class Groups in Rust☆11Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- ☆32Updated 5 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 8 months ago
- Multibase in rust☆47Updated last week
- Multilayered Linkable Spontaneous Anonymous Group - Implemented as is from paper. Not Monero specific☆24Updated 4 years ago
- HACL*, a formally verified cryptographic library for Rust (binding to hacl-c).☆28Updated 5 years ago
- Rust crate for BLS signatures☆32Updated 9 months ago
- Asynchronously safe BFT consensus, implementation in Rust☆35Updated 5 years ago
- ☆11Updated 6 years ago
- LibP2P networking library written in Rust☆12Updated 3 years ago
- ☆11Updated 7 years ago
- A pure rust implementation of Arcturus proofs for confidential transactions.☆12Updated 4 years ago
- WASM contracts standard library for Rust☆55Updated 6 years ago
- RSA blind signatures in Rust☆29Updated last month
- ☆24Updated 2 years ago
- A pure Rust implementation of BLAKE2 based on RFC 7693.☆63Updated 3 years ago
- Merkle tree toolkit☆46Updated 4 years ago
- Compiles r1cs gadgets to the zkinterface format☆10Updated 4 years ago
- Rust language bindings for Bitcoin secp256k1 library.☆17Updated 5 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆38Updated 2 years ago
- Rust Tor Controller library☆25Updated 5 years ago
- Golem rust-libp2p integration☆12Updated 5 years ago
- ☆32Updated 6 years ago
- Challenge Bypass using the Ristretto group☆35Updated this week
- A library for converting to/from base-58☆8Updated 6 years ago