Cryptocurrencies and smart-contracts on top of a blockchain aren't the most trivial concepts to understand, things like wallets, addresses, block proof-of-work, transactions and their signatures, make more sense when they are in a broad context. Inspired by naivechain, this project is an attempt to provide as concise and simple an implementation of a cryptocurrency as possible. From Wikipedia : A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency.
blockchain cryptocurrency nodejs swagger eddsa"JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node.js, Browser, Cloudflare Workers, Electron, and Deno. The test suite utilizes examples defined in RFC7520 to confirm its JOSE implementation is correct.
verify jwt node browser jose validate jsonwebtoken sign jwk jwe jws jwa encrypt decrypt jwks deno cloudflare-workers cloudflare compact decode detached ec ecdsa eddsa electron embedded flattened general isomorphic json-web-token oct okp payload pem pkcs8 rsa secp256k1 signature spki universal webcrypto workers x509Port of TweetNaCl / NaCl to JavaScript for modern browsers and Node.js. Public domain.The primary goal of this project is to produce a translation of TweetNaCl to JavaScript which is as close as possible to the original C implementation, plus a thin layer of idiomatic high-level API on top of it.
crypto authentication signature elliptic-curves secretbox djb salsa20 curve25519 eddsa sha-512 tweetnacl nacl libsodium ed25519 cryptography encrypt hash key poly1305 public signaturesA WebAssembly (via AssemblyScript) set of cryptographic primitives for building authentication and key exchange protocols.
wasm webassembly assemblyscript eddsa ed25519 cryptographyWe demonstrated how to recover enough part of the secret key of a device performing EdDSA signatures thanks to a single fault at the right time to be able to produce seemingly valid signature (even though the real signature by the actual secret key holder would not have the same value). This is an inherent weakness of the algorithms and cannot be avoided as long as the algorithms are generating their values through deterministic means. Our paper was presented during FDTC 2017. We give here the code to perform fault signature simulations as well as key recovery from faulted signatures. In our example setup, we were able to attack and recover the secret key stored in an Arduino Nano running Ed25519 signature using the ArduinoLibs.
cryptography research hardware-security attack faulted-signatures fault-attack eddsa arduino-nanoImplementation of EdDSA in Java
eddsa ed25519 crypto-librarySmall, wasm-friendly, zero-dependencies Ed25519 implementation for Rust.
crypto ed25519 eddsagnark-crypto has not been audited and is provided as-is, use at your own risk. In particular, gnark-crypto makes no security guarantees such as constant time implementation or side-channel attack resistance. gnark-crypto packages are optimized for 64bits architectures (x86 amd64) and tested on Unix (Linux / macOS).
cryptography ecc elliptic-curves biginteger eddsa pairing bn256 zksnark mimc snark zksnarks zkp bls12-381 bn254 zkproof bls12-377
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.