Hexens / pillerLinks
Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines
☆11Updated 2 years ago
Alternatives and similar repositories for piller
Users that are interested in piller are comparing it to the libraries listed below
Sorting:
- Fast paced learning group for ZK enthusiasts focused on circuit development & Security☆35Updated 2 years ago
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Updated 2 years ago
- ☆17Updated 2 months ago
- Contains several examples and challenges to use Lambdaworks☆15Updated 2 years ago
- Write-ups submitted by CTF participants☆35Updated 2 years ago
- Hyper-Optimised Secp256r1/P256 Verifier Huff Implementation☆26Updated last year
- ☆19Updated 2 years ago
- SMT 2023 Submission; license pending☆56Updated last year
- ☆12Updated 2 years ago
- ☆31Updated last year
- Code used in a recent presentation showing off noir storage proofs☆15Updated 2 years ago
- A Rust macro for quickly unwrapping a refutable pattern.☆12Updated 2 years ago
- A collection of all the project ideas involving zk, blockchains & what not☆23Updated 2 years ago
- ☆11Updated last year
- Tstore huff template☆17Updated 2 years ago
- Prove knowledge of smart contract bugs using zkEVM☆43Updated last year
- Mutation testing tool for circom☆16Updated 2 years ago
- Plonk verifier in solidity (using Commit api)☆22Updated last year
- Share private EVM state attestations using STARK proofs☆73Updated 3 years ago
- MEV Olympics☆44Updated 11 months ago
- A curated list of awesome resources for learning and programming with Circom☆23Updated 2 years ago
- Example of the whitehack for Curve exploit 30/07/23☆19Updated 2 years ago
- Export Circom verifier to Cairo☆49Updated 3 years ago
- Honk Verifier in Solidity☆50Updated last year
- Automated verification of uniqueness property for ZKP circuits☆43Updated last year
- Solidity By Example rewritten in Huff, the most based low-level EVM language.☆34Updated last year
- BigInt library for Aztec's noir language☆32Updated last year
- POCs and In-depth explanation of the logic and math behind common elliptic curve cryptography edge cases and attack vectors☆43Updated last year
- Blog☆23Updated 2 years ago
- A Brainfuck zkVM with Circom.☆59Updated 2 years ago