Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines
☆11Feb 13, 2023Updated 3 years ago
Alternatives and similar repositories for piller
Users that are interested in piller are comparing it to the libraries listed below
Sorting:
- The Noir library for the Fraction data type, maintained by Resurgence Labs.☆11Jul 30, 2024Updated last year
- ☆14Aug 19, 2021Updated 4 years ago
- ☆18Dec 5, 2023Updated 2 years ago
- ☆19Jan 20, 2023Updated 3 years ago
- List of the public smart contract audit reports and security reviews performed by Hexens.☆55Feb 17, 2026Updated 2 weeks ago
- Shared Lurk source code, including tests and library code.☆18Mar 3, 2024Updated 2 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- ☆17Sep 10, 2025Updated 5 months ago
- BN254 Pairing Implementation in Noir☆23Aug 23, 2023Updated 2 years ago
- An example of how to build an end-to-end dApp with plonky2x☆22Aug 30, 2023Updated 2 years ago
- Foundation for speedy Machine Learning operations in Halo2 Prover☆20Oct 3, 2024Updated last year
- Implementation of the blindbid logic within Zero Knowledge Proofs☆21Sep 15, 2021Updated 4 years ago
- ☆10Mar 15, 2023Updated 2 years ago
- Using Dynamic Huffidity to embed MiMCSponge Hash bytecode by tornado cash to a solidity contract.☆10Sep 8, 2023Updated 2 years ago
- halo2-lib-eddsa☆11Feb 2, 2024Updated 2 years ago
- ☆13Aug 23, 2023Updated 2 years ago
- ☆10May 9, 2023Updated 2 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- 🦎 Prototypes on polymorphic, metamorphic and poly-metamorphic malwares in Rust 🦎☆14Oct 8, 2023Updated 2 years ago
- A Rust macro for quickly unwrapping a refutable pattern.☆12Nov 10, 2023Updated 2 years ago
- A new type of zk-EVM for L2 rollup☆10Feb 1, 2025Updated last year
- ☆10Sep 15, 2023Updated 2 years ago
- ☆10Sep 22, 2023Updated 2 years ago
- Pure Rust implementation of the PLONK ZKProof System done by the Dusk-Network team.☆15Aug 10, 2020Updated 5 years ago
- Groth16 fraud proof generation PoC using leaked toxic waste. Forked and modified from Arkworks' Rust implementation of the Groth16 zkSNAR…☆11Oct 10, 2023Updated 2 years ago
- ☆16Jan 5, 2023Updated 3 years ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Jun 15, 2023Updated 2 years ago
- ☆14Oct 27, 2023Updated 2 years ago
- A vscode extension that copies huff's code stack comment and paste in the next line, making it easy for Huffooors to write opcodes w/o wo…☆14Apr 25, 2024Updated last year
- ☆12Sep 19, 2023Updated 2 years ago
- 👓☆15Jan 20, 2023Updated 3 years ago
- ☆13Sep 18, 2023Updated 2 years ago
- Some of Our Audit Reports, Presentations, etc☆13Mar 26, 2024Updated last year
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 6 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- create metamorphic contracts using this template.☆14Mar 15, 2023Updated 2 years ago
- Implements ERC-5564 for multiple elliptic curves using arkworks-rs☆37Updated this week
- ☆42Jul 25, 2024Updated last year