MynaWallet / monorepoLinks
☆21Updated last year
Alternatives and similar repositories for monorepo
Users that are interested in monorepo are comparing it to the libraries listed below
Sorting:
- zkSNARK circuits for the Telepathy protocol☆53Updated 2 years ago
- Implements ERC-5564 for multiple elliptic curves using arkworks-rs☆36Updated this week
- ☆38Updated last year
- storage proof made by sp1☆25Updated 11 months ago
- Installation tooling for Noir☆30Updated 3 months ago
- Circuits, written in circom, for Proof Of Solvency☆26Updated 2 years ago
- Hackathon for EthBogota - An Eth2 light client using Cannon verifyable computation☆30Updated 2 years ago
- ☆26Updated 2 weeks ago
- BigInt library for Aztec's noir language☆32Updated last year
- ERC4337-based social recovery wallet with Noir zk-ecdsa☆21Updated 2 years ago
- Ethereum stateless tools☆45Updated 4 months ago
- A circuit to verify the voice recovery process.☆49Updated 2 years ago
- ☆17Updated 2 years ago
- RLN circuits in Circom☆31Updated last year
- Noir implementation of RSA-verify☆43Updated last year
- Email verification circuit in halo2☆68Updated last year
- Curdleproofs is a zero-knowledge shuffle argument☆69Updated last year
- A Solidity implementation of Halo2's Pasta curves☆49Updated 2 years ago
- Tooling to develop and emulate verifyable programs compatible with Optimism Cannon and the OP Stack 🦀🎆☆55Updated last year
- 🦄 UniswapV3 fork that computes swaps off-chain via a zkVM☆84Updated last year
- Share private EVM state attestations using STARK proofs☆73Updated 3 years ago
- Prove knowledge of smart contract bugs using zkEVM☆43Updated 11 months ago
- an introduction to noir, with simple examples☆44Updated last year
- A convenient way for developers to compile, cache, and execute circom circuits, as well as to generate proofs.☆34Updated 2 years ago
- .ptau deserializer for gnark groth16 bn254 trusted setup☆26Updated 5 months ago
- Noir library to verify JWT tokens, and prove claims.☆29Updated this week
- A Brainfuck zkVM with Circom.☆59Updated 2 years ago
- Leveraging zk for trustlessly selling private keys, signatures and groth16 proofs.☆92Updated 2 years ago
- ☆33Updated last year
- Delve into low-level RISC Zero machine☆28Updated last year