A protocol for the tokenization of financial securities on the Ethereum blockchain
☆27Dec 8, 2019Updated 6 years ago
Alternatives and similar repositories for SFT-Protocol
Users that are interested in SFT-Protocol are comparing it to the libraries listed below
Sorting:
- Deploys a bitcoin full node to AWS or Google Cloud.☆12Aug 7, 2018Updated 7 years ago
- Open source solver to the batch auction problem.☆13Feb 16, 2021Updated 5 years ago
- this implements verifiable secret sharing☆41Jan 3, 2023Updated 3 years ago
- CoMakery Ethereum helps you create and administer collaborative token based projects.☆12Dec 16, 2017Updated 8 years ago
- ☆18Jul 28, 2020Updated 5 years ago
- Swapping of tokens from Waves to Ethereum and back☆12May 29, 2017Updated 8 years ago
- Perun's Ethereum State Channel Contracts. (Development on this project is continued at Hyperledger Labs.)☆10Dec 3, 2020Updated 5 years ago
- Decentralize your secrets!☆116Sep 1, 2019Updated 6 years ago
- utxohunt assignment for 6.892☆12Aug 2, 2017Updated 8 years ago
- DKG for BLS threshold signature scheme on the EVM using solidity☆32Jan 13, 2019Updated 7 years ago
- ☆20Jul 10, 2025Updated 8 months ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Curve25519-based cryptography in JavaScript☆33Jan 28, 2016Updated 10 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Polkadot Protocol Conformance Tests☆10May 22, 2023Updated 2 years ago
- Build a collection of tools / scripts to monitor EOS BP infra, including full nodes and producer nodes☆14Aug 26, 2018Updated 7 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- ☆13Mar 12, 2026Updated last week
- Flexible diversification for DAO treasuries☆10Jul 6, 2022Updated 3 years ago
- A TenderMint blockchain API to make collaborative work measurable & quantifiable☆16Nov 13, 2016Updated 9 years ago
- geth metrics exporter for Prometheus☆13Jan 21, 2026Updated 2 months ago
- Tool to fetch and analyze blockchain transactions☆10Mar 9, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Mar 4, 2020Updated 6 years ago
- XCLAIM(BTC,ETH): Solidity implementation for Bitcoin backed tokens on Ethereum☆22Mar 25, 2024Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago