sipa / purify
A PRF with low multiplicative complexity
☆21Updated 5 years ago
Alternatives and similar repositories for purify:
Users that are interested in purify are comparing it to the libraries listed below
- Taproot security proof☆22Updated 5 years ago
- Naive implementation of ROAST protocol for robust threshold signatures☆33Updated 7 months ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆26Updated 4 years ago
- My poster for Financial Crypto 2020 analysing the hash function requirements for Taproot to be secure in the generic group model.☆11Updated 5 years ago
- ☆55Updated last week
- What are the limits of Bitcoin Script?☆46Updated last year
- Implementation of bulletproofs++ in rust☆15Updated 2 years ago
- A BIP draft for BIP340-compatible FROST threshold signing protocol☆17Updated last week
- Fun with MuSig2 and Ledger devices 🎵☆13Updated last month
- Random collection of zero-knowledge stuff☆17Updated 6 years ago
- EXPERIMENTAL: Bitcoin Core Prometheus exporter based on User-Space, Statically Defined Tracing and eBPF.☆30Updated 8 months ago
- A PoC implementation of a multiparty vault architecture☆29Updated 4 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Updated 2 years ago
- ☆34Updated 6 months ago
- ☆21Updated 2 months ago
- JavaScript bindings of libsecp256k1-zkp with support for pedersen commitments and range proofs.☆16Updated last year
- Summary of mempool design, challenges, and proposals (re: fees)☆41Updated 2 years ago
- Schnorr related examples (Schnorr, BN, MuSig, discreet log contracts)☆36Updated 6 years ago
- A community R&D process about covenants, transaction introspections and new class of Bitcoin contracting applications☆38Updated last year
- A pure-rust secp256k1 library optimised for fun☆110Updated 3 months ago
- Wasabi Research Club☆41Updated last year
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Updated 4 years ago
- Simple implementation of Bitcoin CoinSwap, client-server☆32Updated 6 years ago
- Onchain security and performance analysis of Bitcoin's second-layer protocols☆43Updated 3 years ago
- ☆32Updated last month
- ☆16Updated last month
- Tool to monitor for P2P anomalies and attacks using Bitcoin Core honeynodes☆22Updated this week
- See https://github.com/lightningdevkit/ldk-sample instead.☆35Updated 5 years ago
- Fast additive accumulators☆14Updated 4 years ago
- proof of concept that creates a ring signature over all taproot outputs in the UTXO set☆58Updated 4 years ago