Official implementation of the ThreeFold blockchain
☆13Jul 1, 2020Updated 5 years ago
Alternatives and similar repositories for tfchain
Users that are interested in tfchain are comparing it to the libraries listed below
Sorting:
- Example of a simple JS obfuscator☆33Jan 4, 2023Updated 3 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Resources for Tezos Developers☆35Jan 14, 2020Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- J4F - PHP Blockchain with Smart Contracts☆13May 14, 2022Updated 3 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated last year
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Aug 26, 2018Updated 7 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- code for UniK Hub backend☆10Aug 22, 2016Updated 9 years ago
- Compact Proofs of Retrievability☆14May 28, 2014Updated 11 years ago
- A framework for building native apps with React.☆10Apr 22, 2015Updated 10 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Arithmetic in Rust's Type System☆11Feb 18, 2024Updated 2 years ago
- Commandline tools for the Opus audio codec☆13Jun 24, 2017Updated 8 years ago
- Tool to fetch and analyze blockchain transactions☆10Mar 9, 2021Updated 4 years ago
- Proof of concept for lua-resty-openidc as a Traefik forward auth server☆12Dec 18, 2018Updated 7 years ago
- ☆10Jun 28, 2025Updated 8 months ago
- High efficiency string manipulation in Brainfuck, re-imagined.☆13Apr 10, 2024Updated last year
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Quick switching between C/C++ header and source files☆13Apr 10, 2022Updated 3 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11May 3, 2024Updated last year
- ☆13May 31, 2023Updated 2 years ago
- ☆10Nov 28, 2017Updated 8 years ago
- ☆14Sep 11, 2014Updated 11 years ago
- Makes it simple to scrape websites with xpath structs.☆13Mar 10, 2023Updated 2 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆13Feb 23, 2026Updated last week
- ☆10Oct 22, 2019Updated 6 years ago
- Checkpointing PoW blockchains with HotStuff BFT☆10Jan 5, 2022Updated 4 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- ☆17Apr 3, 2025Updated 11 months ago
- Github老玩家自己搭的服务器,老飞飞原版,可联机-天马座☆11May 14, 2019Updated 6 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- ☆11Nov 9, 2025Updated 3 months ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Mar 4, 2020Updated 6 years ago