3lLobo / zkAuth
2FA with Zero-Knowledge proofs
☆48Updated 3 weeks ago
Alternatives and similar repositories for zkAuth:
Users that are interested in zkAuth are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- ☆96Updated last year
- e=vm² (pronounced evm-squared; the = is silent) is an evm that runs inside evm.☆91Updated 2 years ago
- BYOR - Build Your Own Rollup☆63Updated last year
- Memory access with runtime typechecking in Solidity☆73Updated last year
- ☆39Updated last year
- ☆48Updated last year
- ☆56Updated last year
- Smart contracts for the Telepathy protocol☆76Updated last year
- 🦄 UniswapV3 fork that computes swaps off-chain via a zkVM☆84Updated last year
- Bundler specification test suites☆78Updated 2 weeks ago
- Account2 is three things: - Account Abstraction (AA) - Economic Abstraction (EA) - Account Linking☆78Updated 2 years ago
- To collect data on the performance and security characteristics of ZK circuits being verified on the Ethereum Blockchain and expose this …☆60Updated 2 years ago
- SUAVE Application Examples☆57Updated 4 months ago
- ☆47Updated last year
- Upgradeable Contracts using the Diamond Storage pattern.☆50Updated last year
- Modular account abstraction with EIP-3074.☆47Updated last year
- Extremely performant EVM oracle utilizing aggregated Schnorr signatures☆56Updated 2 months ago
- Hardhat plugin to integrate Circom and SnarkJS into your build process.☆117Updated last year
- Zero-Knowledge OTP verification on chain☆45Updated 2 years ago
- IDEN3 smartcontracts☆95Updated this week
- Leveraging zk for trustlessly selling private keys, signatures and groth16 proofs.☆91Updated last year
- A Weth10 variant that allows users to create explicit MEV.☆73Updated 2 years ago
- An onchain game which explores different ZK game mechanics and information asymmetry☆93Updated last year
- Circom circuits used by the iden3 core protocol.☆89Updated 3 weeks ago
- ☆49Updated 2 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 2 months ago
- Serverless function on Reth☆73Updated 7 months ago
- A single-node implementation of a Shadow RPC on top of Reth, utilizing ExEx and custom RPC methods.☆99Updated 4 months ago
- Simple module to control a Safe via crosschain calls with Hashi☆28Updated 3 months ago