HastilyConceivedCreatures / safecat
A CLI tool to for crypto functions
☆11Updated 2 weeks ago
Alternatives and similar repositories for safecat:
Users that are interested in safecat are comparing it to the libraries listed below
- Curdleproofs is a zero-knowledge shuffle argument☆69Updated last year
- Shared Lurk source code, including tests and library code.☆18Updated 10 months ago
- An experimental rust zksnarks compiler with embeeded bellman-bn128 prover☆42Updated 3 years ago
- ☆24Updated 10 months ago
- Zero Knowledge Virtual Machine from scratch implementing Pinocchio☆38Updated last year
- Lurk is a Turing-complete programming language for zk-SNARKs. It is a statically scoped dialect of Lisp, influenced by Scheme and Common …☆58Updated this week
- JSON parser written in Lurk☆29Updated last year
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Updated 3 years ago
- ☆12Updated last month
- ☆32Updated last year
- We're living in Obfustopia☆20Updated 3 weeks ago
- Implementation of the Caulk protocol: https://eprint.iacr.org/2022/621.pdf☆12Updated 2 years ago
- RISCU emulator and zk circuit simulator as a reference for a Jolt implementation☆23Updated last year
- ☆32Updated 2 years ago
- An api for constructing sparse Merkle tree accumulators with random sampling capabilities.☆24Updated 3 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Updated 4 years ago
- Solidity implementation of the baby jubjub curve☆22Updated 9 months ago
- A battleship game using ZKPs☆43Updated last year
- Fast implementation of multi-scalar multiplication in WebAssembly☆33Updated last month
- Cryptography libraries for ZKsync☆27Updated this week
- Polymath: Groth16 Is Not The Limit☆29Updated 4 months ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Updated last year
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- circom runtime☆20Updated 3 months ago
- ☆28Updated last year
- A Cairo VM prover implemented using Winterfell☆16Updated last year
- ☆22Updated last month
- Futhark implementation of neptune-compatible Poseidon.☆27Updated 3 years ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆24Updated 5 years ago