tls-n / tlsnutilsLinks
Solidity Library for parsing and verifying TLS-N proofs.
☆17Updated 8 years ago
Alternatives and similar repositories for tlsnutils
Users that are interested in tlsnutils are comparing it to the libraries listed below
Sorting:
- Secure Bitcoin price feed based on TLS-N proofs.☆14Updated 5 years ago
- Bamboo: a morphing smart contract language☆37Updated 7 years ago
- An educational "toy" implementation of fully abstracted state channels☆49Updated 9 years ago
- Repository for Research on Conviction voting schemes☆51Updated 2 years ago
- The world's first sybil resistant, fully decentralized reputation protocol.☆26Updated 6 years ago
- Efficient multi-asset confidential transactions☆34Updated 6 years ago
- ☆42Updated 9 years ago
- The Bond API.☆27Updated 7 years ago
- Simulator for some PoS or consensus algorithms. Includes dfinity, casper IMD and others☆46Updated 6 years ago
- Decentralized monetary trust network☆32Updated 8 years ago
- formal verification of multicollateral dai in the K framework☆44Updated 4 years ago
- Code to generate snark proofs for batch auction result validation of the Gnosis d.exchange☆46Updated 7 years ago
- KVyper: Semantics of Vyper in K☆41Updated 7 years ago
- Linked Data Capabilities reference implementation☆28Updated 8 months ago
- Ethereum-Zcash Integration effort☆66Updated 6 years ago
- ☆42Updated 5 years ago
- Whitepaper describing the Keep network☆37Updated 5 years ago
- ☆20Updated 7 years ago
- Tools for peer-to-peer privacy with Ethereum and AZTEC☆43Updated last year
- Off-chain poker in Ethereum☆23Updated 8 years ago
- Public working documents (e.g., Internet drafts)☆25Updated 7 years ago
- Hobbits is a lightweight wire protocol for ETH 2.0 network testing purposes.☆29Updated 6 years ago
- Dr. Y's Ethereum Contract Analyzer☆41Updated 3 years ago
- Formal specification and reference implementation of Casper☆15Updated 10 years ago
- ☆43Updated 7 years ago
- You will find an index of our research work here.☆26Updated 5 years ago
- A highly performant merkle set data structure. To be ported to C later.☆75Updated 8 years ago
- 👘 Opening the kimono one time-lock at a time☆31Updated 7 years ago
- Verify Estonian e-id signatures on Ethereum☆62Updated 3 years ago
- Privacy layer for blockchain and decentralized applications based on proxy re-encryption☆67Updated 4 years ago