Coda + Dekrypt: The SNARK Challenge - Reference Material
☆35Mar 27, 2022Updated 3 years ago
Alternatives and similar repositories for snark-challenge
Users that are interested in snark-challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- On O(1) Labs' reference machine, this SNARK prover is 3x faster than libsnark!☆98Nov 21, 2023Updated 2 years ago
- ☆21Mar 27, 2022Updated 3 years ago
- ☆34Dec 16, 2025Updated 3 months ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆78Dec 10, 2019Updated 6 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- ☆16Oct 19, 2022Updated 3 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- ☆14May 3, 2019Updated 6 years ago
- a sketch of what a zkvm could look like☆26Apr 19, 2021Updated 4 years ago
- ☆15May 27, 2021Updated 4 years ago
- Fully-compatible implementation of Privacy Pass in Rust.☆34Apr 20, 2020Updated 5 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Dec 18, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python3 implementation of the Pippenger algorithm for fast multi-exponentiation☆22Dec 8, 2022Updated 3 years ago
- ☆17Feb 3, 2024Updated 2 years ago
- A library for decentralized private computation☆19Jul 21, 2021Updated 4 years ago
- ☆13Mar 12, 2026Updated last week
- A zkSNARK implementation of a merkle tree membership preimage proof.☆22May 6, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A golang demo for zk-SNARK aggregation☆41Jun 23, 2019Updated 6 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Nov 18, 2024Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Feb 9, 2018Updated 8 years ago
- ☆10Oct 22, 2019Updated 6 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆18Sep 3, 2021Updated 4 years ago
- An elastic proof system based on arkworks☆85Dec 21, 2023Updated 2 years ago
- ☆117Aug 6, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- SageMath library for constructing elliptic curves☆74Jul 14, 2023Updated 2 years ago
- CUDA implementation of Fast Fourier Transformations on finite fields☆80Nov 26, 2019Updated 6 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- Generator and supporting evidence for security of the Pluto/Eris half-pairing cycle of elliptic curves☆32Apr 18, 2021Updated 4 years ago
- Library for the verification of BGLS signatures on the EVM using Solidity.☆15Mar 14, 2018Updated 8 years ago
- Designing Secure Cryptography☆22May 20, 2019Updated 6 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago