truechain / truechain-fpow
Prototype implementation for Fruit Chain based on Ethereum.
☆13Updated 6 years ago
Alternatives and similar repositories for truechain-fpow:
Users that are interested in truechain-fpow are comparing it to the libraries listed below
- ☆44Updated 7 years ago
- Ethereum Smart Contracts for Arwen payment channels☆14Updated 3 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆31Updated 6 years ago
- ☆28Updated 3 years ago
- zkSNARKs for Bitcoin transaction inclusion proofs on Ethereum via ZoKrates☆11Updated 5 years ago
- ☆25Updated 6 years ago
- Distributed key generation☆21Updated 6 years ago
- A libsnark's tutorial on sudoku☆17Updated 6 years ago
- Sample implementation of NSEC5 cryptography☆23Updated 6 years ago
- Go implementation of Algorand algorithm.☆28Updated 6 years ago
- Learning how to bulletproofs☆35Updated 6 years ago
- Accountable Watching Service☆28Updated 2 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆16Updated 5 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆29Updated 5 years ago
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆63Updated 3 years ago
- ☆11Updated 2 years ago
- Bulletproofs Implementation in Go☆16Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- TU Delft Blockchain Engineering course project on scale-out distributed ledger☆14Updated 7 years ago
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation☆14Updated 2 years ago
- interBTC specification for a trust-minimized Bitcoin to Polkadot (and beyond) bridge☆17Updated 2 years ago
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆15Updated 4 years ago
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆27Updated 4 years ago
- A python version of the components of zcash zk-SNARKs - https://z.cash/technology/zksnarks☆12Updated 6 years ago
- Publicly Verifiable Secret Sharing, and more...☆27Updated 7 months ago
- MPC implementation of proof of custody☆32Updated 3 years ago
- An implementation of the Groth-Sahai NIZK protocol☆14Updated 8 years ago
- Implementations of Ring Signature schemes.☆24Updated 7 years ago
- Cryptographic accumulator☆10Updated 7 years ago
- A high-level API for signing and verifying message digests using the BLS threshold signature scheme.☆114Updated 6 years ago