Janmajayamall / bfvView external linksLinks
☆26Feb 25, 2024Updated last year
Alternatives and similar repositories for bfv
Users that are interested in bfv are comparing it to the libraries listed below
Sorting:
- bottom text☆16Jan 26, 2024Updated 2 years ago
- ProtoGalaxy folding scheme PoC implementation https://eprint.iacr.org/2023/1106.pdf☆41Sep 14, 2023Updated 2 years ago
- [WIP] Indistinguishability/Ideal Obfuscation (iO) Library based on https://eprint.iacr.org/2021/1334.pdf☆36Oct 10, 2024Updated last year
- An implementation of Sangria☆17Jun 1, 2023Updated 2 years ago
- Based on https://eprint.iacr.org/2022/1510☆26Oct 20, 2024Updated last year
- Nova: Recursive SNARKs without trusted setup☆44Aug 21, 2023Updated 2 years ago
- plonky2 implementation of bn254 pairing☆19Feb 1, 2024Updated 2 years ago
- BFV implementation in Python☆27Jul 16, 2024Updated last year
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Nova-based SHA256 benchmarks☆31Jun 7, 2025Updated 8 months ago
- Groth16 verifier in EVM☆23Jul 8, 2023Updated 2 years ago
- ☆38Jul 30, 2025Updated 6 months ago
- ☆10Sep 15, 2023Updated 2 years ago
- ⚙️ A library for proving PLONKish circuits (halo2) in the EVM.☆11Aug 14, 2023Updated 2 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆58Aug 2, 2025Updated 6 months ago
- ☆13Nov 10, 2023Updated 2 years ago
- ☆14Oct 27, 2023Updated 2 years ago
- Experimental folding schemes library☆260Feb 6, 2026Updated last week
- Experimental implementation of the SuperNova protocol. https://eprint.iacr.org/2022/1758☆122Feb 25, 2023Updated 2 years ago
- Solidity libraries and contracts for verifying WHIR proofs on the EVM.☆28Dec 19, 2024Updated last year
- generate snark proofs in browser - batteries included☆12Nov 11, 2022Updated 3 years ago
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆114Mar 20, 2024Updated last year
- ☆31Oct 27, 2025Updated 3 months ago
- ☆17Feb 13, 2023Updated 3 years ago
- A pqSNARK with lightweight proofs, powered by the Whir PCS.☆45Sep 11, 2025Updated 5 months ago
- ☆30Aug 10, 2023Updated 2 years ago
- ☆41Jan 7, 2024Updated 2 years ago
- ☆39Jan 8, 2024Updated 2 years ago
- Multi-party computation libraries written in Rust 🦀☆284Feb 3, 2026Updated last week
- ☆50Feb 11, 2025Updated last year
- Extractable Witness Encryption for KZG Commitments☆32Nov 29, 2024Updated last year
- Pluto Web Prover 🦀☆39Mar 18, 2025Updated 10 months ago
- client side proving☆39Mar 12, 2025Updated 11 months ago
- A framework for SPDZ-style maliciously-secure MPC.☆57Dec 21, 2025Updated last month
- ☆16Mar 11, 2024Updated last year
- Notes, code and documents done while reading books and papers.☆21Updated this week
- Verifiable and confidential computation based on ZKP and FHE, powered by risc0 zkVM.☆86Apr 20, 2023Updated 2 years ago
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61May 22, 2023Updated 2 years ago