sipa / safegcd-boundsLinks
Bounds on divsteps iterations in safegcd
☆54Updated last year
Alternatives and similar repositories for safegcd-bounds
Users that are interested in safegcd-bounds are comparing it to the libraries listed below
Sorting:
- A PRF with low multiplicative complexity☆20Updated 5 years ago
- Bulletproofs++: Even Shorter Range Proofs☆28Updated 3 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14Updated 5 years ago
- A detailed description of how Bitcoin Elements Alpha Confidential Transactions works☆59Updated 7 years ago
- High Assurance Cryptographic Software☆10Updated 11 months ago
- BLST-Verification☆22Updated 9 months ago
- A collection of various writeups on research topics☆53Updated 9 months ago
- EXPERIMENTAL: Bitcoin Core Prometheus exporter based on User-Space, Statically Defined Tracing and eBPF.☆30Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- ☆17Updated 2 months ago
- C crypto library☆24Updated 2 years ago
- Website to collect open bitcoin research problems.☆71Updated 2 years ago
- Taproot security proof☆22Updated 5 years ago
- ☆34Updated last year
- Unsafe 3-round MuSig in Python for experimentation☆11Updated 2 years ago
- Rust Nym Bitcoin Transaction Broadcaster☆32Updated 4 years ago
- ☆23Updated 3 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- zkChannels: Anonymous Payment Channels for Bitcoin, Zcash, Tezos and more☆71Updated 3 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆19Updated 5 years ago
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆59Updated 4 years ago
- Fast additive accumulators☆14Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 3 years ago
- Documentation about scriptless scripts☆168Updated 9 months ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Naive implementation of ROAST protocol for robust threshold signatures☆33Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 6 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Updated 7 years ago
- ☆22Updated 9 months ago