☆14May 3, 2019Updated 6 years ago
Alternatives and similar repositories for sapling-security-analysis
Users that are interested in sapling-security-analysis are comparing it to the libraries listed below
Sorting:
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆19May 10, 2020Updated 5 years ago
- The modular protocol framework based on Universal Composability☆17Jun 24, 2020Updated 5 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- ☆13Feb 23, 2026Updated last week
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- ☆17Mar 17, 2023Updated 2 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- A Rust implementation of the K2Tree, an extremely space-efficient way of representing sparse bit-matrices.☆17Apr 13, 2022Updated 3 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Apr 28, 2022Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- A standard point from which crypto projects may derive their responsible disclosure policy.☆18Apr 27, 2022Updated 3 years ago
- ☆17Feb 3, 2024Updated 2 years ago
- An alternative full node bitcoin implementation written in Go (golang)☆20Jan 24, 2022Updated 4 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Jan 2, 2023Updated 3 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Fawkes-Crypto - zkSNARKs framework☆21Feb 6, 2024Updated 2 years ago
- Multilayered Linkable Spontaneous Anonymous Group - Implemented as is from paper. Not Monero specific☆24May 10, 2020Updated 5 years ago
- ☆22Oct 3, 2022Updated 3 years ago
- A specification of the CBC Casper consensus protocols written in TLA+ and PlusCal (transpiled to TLA+)☆20Aug 12, 2019Updated 6 years ago
- Notary: A Device for Secure Transaction Approval 📟☆28Feb 1, 2025Updated last year
- A zkSNARK implementation of a merkle tree membership preimage proof.☆22May 6, 2019Updated 6 years ago
- Cryptographic protocols☆38Apr 19, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Coda + Dekrypt: The SNARK Challenge - Reference Material☆35Mar 27, 2022Updated 3 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆43Jul 22, 2023Updated 2 years ago
- Low level arithmetic primitives in RTL☆23Apr 3, 2020Updated 5 years ago
- Website!☆22Sep 20, 2022Updated 3 years ago
- Fully-compatible implementation of Privacy Pass in Rust.☆34Apr 20, 2020Updated 5 years ago