Testing schnorr signature scheme with a naive python implementation
☆12Jul 8, 2018Updated 7 years ago
Alternatives and similar repositories for schnorr-python
Users that are interested in schnorr-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a clone of iOS Photos app.☆11Jun 13, 2021Updated 4 years ago
- Deep Reinforcement Learning - Pong☆13Feb 14, 2022Updated 4 years ago
- Python project to create a classifier to guess if a Twitter account is a man, a woman or a bot.☆18Oct 9, 2019Updated 6 years ago
- Aeronautical Communication Traffic Simulation Based on Kernel Density Estimation Method☆17Jul 29, 2024Updated last year
- An INSECURE implementation of the secp256k1 elliptic curve and related cryptographic schemes written in Python, intended for prototyping,…☆32Jan 20, 2026Updated 2 months ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- ☆19Feb 28, 2025Updated last year
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- 🎆 北京交通大学 LaTeX 生成 PDF 的主题模板 | BJTU-Beamer-Theme☆24Jan 12, 2023Updated 3 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- 12 keys macropad☆21Mar 21, 2022Updated 4 years ago
- Schnorr related examples (Schnorr, BN, MuSig, discreet log contracts)☆35Jul 4, 2018Updated 7 years ago
- Read and write NSData to iOS Camera Roll as .bmp file and share it between apps!☆47Apr 6, 2017Updated 8 years ago
- ☆26Dec 8, 2023Updated 2 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- A practical Ethereum smart contract decompiler☆13Aug 2, 2018Updated 7 years ago
- D3CTF-2022-Official-Writeup☆16Mar 11, 2022Updated 4 years ago
- QGIS differential privacy processing plugin☆23Mar 15, 2016Updated 10 years ago
- Node module for executing FB scripts in a sandboxed Node VM [LEGACY]☆12Sep 28, 2022Updated 3 years ago
- Utility-aware synthesis of differentially private and attack-resilient location traces☆25Jan 20, 2019Updated 7 years ago
- A cron-powered tab scheduling chrome extension☆38Jan 7, 2023Updated 3 years ago
- 公众号推文+日常文章☆19Apr 9, 2020Updated 5 years ago
- A simple Python implementation of threshold BLS signatures.☆41Apr 24, 2024Updated last year
- Schnorr Signatures and MuSig implementation in Python☆33May 3, 2023Updated 2 years ago
- ciao dao - a web3 social network☆12Sep 4, 2020Updated 5 years ago
- The next-generation consortium blockchain platform.☆53Sep 14, 2022Updated 3 years ago
- Python implementation of LFSR and Berlekamp-Massey algorithm.☆17Feb 29, 2020Updated 6 years ago
- TU Delft Blockchain Engineering course project on scale-out distributed ledger☆13Mar 4, 2018Updated 8 years ago
- IBE implementation based on jpbc☆17Jan 9, 2022Updated 4 years ago
- ☆11May 30, 2023Updated 2 years ago
- Your Key Transparency auditor companion☆40Apr 16, 2025Updated 11 months ago
- Regtest Lightning Networks for (python) integration testing☆17Mar 3, 2023Updated 3 years ago
- An Ethereum on CKB solution☆19Jan 7, 2021Updated 5 years ago
- 🎄tree command with icons.☆17Aug 29, 2021Updated 4 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- A Preferential Bayesian optimization library for C++/Python [SIGGRAPH 2017]☆56Nov 11, 2025Updated 4 months ago
- Ethereum Virtual Machine implementation from scratch in Rust☆26Sep 25, 2021Updated 4 years ago
- Smart contract hacking challenge introduced in my talk at DEFCON 28 - Blockchain Village☆23Aug 13, 2021Updated 4 years ago
- ☆35Jul 15, 2020Updated 5 years ago