tls-n / tlsnutilsLinks
Solidity Library for parsing and verifying TLS-N proofs.
☆18Updated 8 years ago
Alternatives and similar repositories for tlsnutils
Users that are interested in tlsnutils are comparing it to the libraries listed below
Sorting:
- Secure Bitcoin price feed based on TLS-N proofs.☆15Updated 5 years ago
- An educational "toy" implementation of fully abstracted state channels☆49Updated 9 years ago
- ☆42Updated 9 years ago
- A highly performant merkle set data structure. To be ported to C later.☆75Updated 7 years ago
- Composable cryptographic conditionals (signatures, hashes)☆23Updated 5 years ago
- A state channels ICO auction contract.☆23Updated 7 years ago
- Bamboo: a morphing smart contract language☆37Updated 6 years ago
- A Python implementation of the Crypto-Conditions spec☆72Updated 2 years ago
- KVyper: Semantics of Vyper in K☆41Updated 7 years ago
- Formal specification and reference implementation of Casper☆15Updated 10 years ago
- An Interface and Reference Implementation of the ERC-884 DGCL Token.☆42Updated 6 years ago
- Home for Filecoin Research☆73Updated 3 years ago
- Off-chain poker in Ethereum☆23Updated 8 years ago
- Ethereum-Zcash Integration effort☆66Updated 6 years ago
- Smart contracts for trustless bridges☆75Updated 5 years ago
- ☆27Updated 2 years ago
- ☆44Updated 7 years ago
- Whitepaper describing the Keep network☆37Updated 5 years ago
- KORD Documentation☆13Updated 7 years ago
- formal verification of multicollateral dai in the K framework☆45Updated 4 years ago
- DEPRECATED in favor of EVM-Lite☆26Updated 7 years ago
- Tools for peer-to-peer privacy with Ethereum and AZTEC☆45Updated last year
- Efficient multi-asset confidential transactions☆34Updated 6 years ago
- Cross chain atomic trades protocol and api for trades between Stellar and Ethereum☆35Updated 7 years ago
- ShareLock: mixing for cryptocurrencies from multiparty ECDSA☆51Updated 2 years ago
- Simulator for some PoS or consensus algorithms. Includes dfinity, casper IMD and others☆46Updated 5 years ago
- Privacy layer for blockchain and decentralized applications based on proxy re-encryption☆67Updated 4 years ago
- Cryptographically provable database (i.e. an urkel tree)☆127Updated 2 years ago
- Repository for Research on Conviction voting schemes☆51Updated 2 years ago
- Taking trustless interactions beyond the chain☆81Updated 9 years ago