MoeMahhouk / gramine-sealing-key-providerLinks
☆13Updated 9 months ago
Alternatives and similar repositories for gramine-sealing-key-provider
Users that are interested in gramine-sealing-key-provider are comparing it to the libraries listed below
Sorting:
- ☆112Updated last year
- ☆105Updated last year
- A PoC repo for a HyperNova impl☆83Updated 2 years ago
- ☆131Updated 10 months ago
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆56Updated 3 months ago
- zkSNARKs as a service using secure multi-party computation.☆30Updated last year
- ☆80Updated 10 months ago
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- Reef: A zkSNARK system for proving that a committed document matches a regex☆76Updated last year
- SGX implementation of the TEE prover used in the Automata Multi-Prover AVS☆29Updated 3 months ago
- ☆23Updated 3 years ago
- Testudo: Spartan + Groth16☆53Updated last year
- A lattice-based non-interactive folding scheme written in Rust☆110Updated last week
- ☆31Updated this week
- DPC with Universal Setup☆46Updated 2 years ago
- A framework for SPDZ-style maliciously-secure MPC.☆54Updated 9 months ago
- The Automata SGX SDK is a software development kit designed to help users quickly build secure enclaves on the Intel SGX platform using R…☆27Updated 10 months ago
- RSA verification circuit using halo2 library.☆57Updated 2 years ago
- Nova: Recursive SNARKs without trusted setup☆44Updated 2 years ago
- Benchmarks of popular zkVMs including Jolt☆63Updated last year
- AES-GCM implementation in Circom☆38Updated 3 years ago
- ☆63Updated 2 weeks ago
- ProtoGalaxy folding scheme PoC implementation https://eprint.iacr.org/2023/1106.pdf☆41Updated 2 years ago
- Groth16 over ICICLE☆37Updated 4 months ago
- ☆57Updated 2 weeks ago
- A FRI verifier circuit for the Halo2 proof system☆77Updated 2 years ago
- Extractable Witness Encryption for KZG Commitments☆29Updated 11 months ago
- ☆25Updated last year
- Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.☆44Updated last year
- In-browser ECDSA aggregation using Nova over secp/secq☆35Updated 2 years ago