HastilyConceivedCreatures / safecatLinks
A CLI tool to for crypto functions
☆11Updated 8 months ago
Alternatives and similar repositories for safecat
Users that are interested in safecat are comparing it to the libraries listed below
Sorting:
- A battleship game using ZKPs☆43Updated last year
- Curdleproofs is a zero-knowledge shuffle argument☆69Updated last year
- CosmWasm + zkVM RISC-V EFI template☆23Updated 2 years ago
- ☆40Updated 5 months ago
- JSON parser written in Lurk☆28Updated 2 years ago
- ☆18Updated this week
- Fast implementation of multi-scalar multiplication in WebAssembly☆34Updated 10 months ago
- Zero Knowledge Virtual Machine from scratch implementing Pinocchio☆39Updated 2 years ago
- ☆33Updated 2 years ago
- These RISC Zero examples have been moved to the main risc0/risc0 repository☆55Updated 2 years ago
- Semaphore v4 implemented in Rust☆10Updated this week
- We're living in Obfustopia☆27Updated 9 months ago
- ☆40Updated 2 years ago
- Shared Lurk source code, including tests and library code.☆18Updated last year
- An async-friendly sparse merkle tree implementation based on Diem's Jellyfish Merkle Tree☆62Updated 5 months ago
- ☆17Updated last year
- Production build of Gauss Labs' MP-PSI API using 2PC and FHE☆17Updated last year
- An implementation of a namespaced merkle tree in Rust.☆31Updated 4 months ago
- circom runtime☆20Updated 11 months ago
- ☆32Updated 3 years ago
- Supporting evidence for security of the baby_jubjub curve to be used in altbn128, Ethereum☆39Updated 6 years ago
- An all-in-one solution for proving that a beacon block is a predecessor of another beacon block.☆17Updated last year
- ☆32Updated last year
- Source, toolchain, and examples for using programs on Entropy☆20Updated 6 months ago
- ☆15Updated this week
- zkID is a team committed to advancing ZKP standards and driving privacy-focused solutions in digital identity.☆22Updated last week
- Implementation of Canetti-Gennaro-Goldfeder-Makriyannis-Peled threshold signing scheme☆81Updated last month
- Some very rough benchmarks between sha256 circuits in different proving systems☆52Updated 3 years ago
- Anybody Problem simulates the 3-body problem in two dimensions using zk proofs written in circom.☆20Updated 3 months ago
- ☆49Updated 2 years ago