signalapp / pokshoLinks
☆10Updated 3 years ago
Alternatives and similar repositories for poksho
Users that are interested in poksho are comparing it to the libraries listed below
Sorting:
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- Challenge Bypass using the Ristretto group☆36Updated last month
- ☆43Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 3 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- High Assurance Cryptographic Software☆10Updated 9 months ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated last year
- Hammersbald is a fast embedded blockchain database☆55Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- BLST-Verification☆22Updated 7 months ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 5 years ago
- A minimal RedJubjub implementation for use in Zebra.☆29Updated last week
- Multilayered Linkable Spontaneous Anonymous Group - Implemented as is from paper. Not Monero specific☆24Updated 5 years ago
- a CCA-secure module-lattice-based KEM☆16Updated 6 years ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆69Updated 3 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆19Updated 4 years ago
- Diffie-Hellman key exchange using the Ristretto255 group, in Rust.☆22Updated 2 years ago
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- Collection of sponge functions written in pure Rust☆47Updated 2 weeks ago
- Torut is tor controller written in rust☆36Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- ☆24Updated 3 years ago
- Zcash "Sapling" cryptography☆85Updated last month
- Pure Rust client for YubiHSM2 devices☆70Updated 5 years ago
- Implementation of a BLS DKG mechanism, requires signing key, encryption key and SocketAddr of participants☆21Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- ☆40Updated 4 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- zkChannels: Anonymous Payment Channels for Bitcoin, Zcash, Tezos and more☆71Updated 3 years ago
- Argument systems for inner pairing products☆43Updated last year