sipa / purifyLinks
A PRF with low multiplicative complexity
☆21Updated 5 years ago
Alternatives and similar repositories for purify
Users that are interested in purify are comparing it to the libraries listed below
Sorting:
- Fun with MuSig2 and Ledger devices 🎵☆13Updated 2 months ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆26Updated 4 years ago
- A PoC implementation of a multiparty vault architecture☆29Updated 4 years ago
- My poster for Financial Crypto 2020 analysing the hash function requirements for Taproot to be secure in the generic group model.☆11Updated 5 years ago
- Naive implementation of ROAST protocol for robust threshold signatures☆33Updated 8 months ago
- Taproot security proof☆22Updated 5 years ago
- Random collection of zero-knowledge stuff☆17Updated 7 years ago
- ☆57Updated 3 weeks ago
- ☆32Updated 2 months ago
- Implementation of bulletproofs++ in rust☆15Updated 2 years ago
- ☆35Updated 7 months ago
- What are the limits of Bitcoin Script?☆46Updated last year
- A community R&D process about covenants, transaction introspections and new class of Bitcoin contracting applications☆38Updated last year
- Schnorr related examples (Schnorr, BN, MuSig, discreet log contracts)☆36Updated 6 years ago
- ☆21Updated 3 months ago
- JavaScript bindings of libsecp256k1-zkp with support for pedersen commitments and range proofs.☆17Updated last year
- Fast additive accumulators☆14Updated 4 years ago
- Bulletproofs++: Even Shorter Range Proofs☆27Updated 3 years ago
- See https://github.com/lightningdevkit/ldk-sample instead.☆35Updated 5 years ago
- Wasabi Research Club☆41Updated last year
- Rust Nym Bitcoin Transaction Broadcaster☆32Updated 4 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Updated 4 years ago
- A detailed description of how Bitcoin Elements Alpha Confidential Transactions works☆58Updated 6 years ago
- proof of concept that creates a ring signature over all taproot outputs in the UTXO set☆58Updated 4 years ago
- Onchain security and performance analysis of Bitcoin's second-layer protocols☆43Updated 3 years ago
- Summary of mempool design, challenges, and proposals (re: fees)☆41Updated 2 years ago
- ☆17Updated 2 months ago
- A webapp for writing credible anonymized confessions☆23Updated 2 years ago
- Website to collect open bitcoin research problems.☆73Updated 2 years ago
- A pure-rust secp256k1 library optimised for fun☆110Updated 2 weeks ago