HastilyConceivedCreatures / safecatLinks
A CLI tool to for crypto functions
☆11Updated 5 months ago
Alternatives and similar repositories for safecat
Users that are interested in safecat are comparing it to the libraries listed below
Sorting:
- JSON parser written in Lurk☆29Updated 2 years ago
- Shared Lurk source code, including tests and library code.☆18Updated last year
- CosmWasm + zkVM RISC-V EFI template☆23Updated 2 years ago
- Curdleproofs is a zero-knowledge shuffle argument☆69Updated last year
- Production build of Gauss Labs' MP-PSI API using 2PC and FHE☆17Updated last year
- circom runtime☆19Updated 8 months ago
- ☆15Updated last week
- 🦀 celestia-node REST client in Rust.☆18Updated 2 years ago
- Non-transferable Badges for Maker Ecosystem Activity @makerdao @ETHGlobal☆17Updated 2 years ago
- private 1inch☆14Updated 2 years ago
- An experimental rust zksnarks compiler with embeeded bellman-bn128 prover☆42Updated 4 years ago
- A minimal implementation of ZKPs of Ethereum block execution using Reth. Supports both Ethereum and OP Stack.☆14Updated last week
- World's first implementation of a (possibly) secure witness encryption scheme. Uses the CLT13 multilinear map.☆34Updated 3 years ago
- A Prolog engine written in Solidity.☆16Updated 3 years ago
- An implementation of a namespaced merkle tree in Rust.☆31Updated 2 weeks ago
- A Zig implementation of Ethereum stealth addresses (ERC-5564)☆33Updated last year
- ☆39Updated last year
- ZK proofs for Brainfuck execution using powdr☆16Updated 10 months ago
- ☆20Updated 4 years ago
- We're living in Obfustopia☆26Updated 5 months ago
- Research prototypes of Data Availability Sampling for Ethereum (WIP)☆16Updated 2 years ago
- Stablecoin AMM for Starknet☆14Updated 2 years ago
- ☆30Updated last year
- Polymath: Groth16 Is Not The Limit☆29Updated 4 months ago
- An api for constructing sparse Merkle tree accumulators with random sampling capabilities.☆24Updated 3 years ago
- Cryptographic key management service providing a gRPC API and support for a variety of key storage methods including YubiHSM2 devices☆17Updated 2 years ago
- sha256(sha256(preimage)) in zk☆14Updated 4 years ago
- Implementation of the Caulk protocol: https://eprint.iacr.org/2022/621.pdf☆12Updated 2 years ago
- A Cairo VM prover implemented using Winterfell☆16Updated 2 years ago
- Zero Knowledge Proofs with Fiat-Shamir Heuristic in Solidity☆15Updated 7 months ago