NillionNetwork / nada-by-exampleLinks
Learn the Nada language by working with example Nada programs
☆12Updated last year
Alternatives and similar repositories for nada-by-example
Users that are interested in nada-by-example are comparing it to the libraries listed below
Sorting:
- Nada-Numpy is a Python library designed for algebraic operations on NumPy-like array objects on top of Nada DSL and Nillion Network.☆12Updated last year
- Nillion technical reports☆23Updated 4 months ago
- Minimal pure-Python implementation of a secure multi-party computation (MPC) protocol for evaluating arithmetic sum-of-products expressio…☆66Updated last year
- Minimal pure-Python library that implements a basic version of a secure decentralized biometric authentication functionality via a secure…☆13Updated last year
- Nada-AI is a Python library designed for ML/AI on top of Nada DSL and Nillion Network.☆22Updated last year
- Source code for "Building Cryptographic Proofs from Hash Functions"☆223Updated last month
- Prototype implementations of various Collaborative zkSNARKs.☆131Updated 7 months ago
- Tooling for creating collaborative SNARKs for Circom and Noir circuits.☆209Updated last week
- Pure-Python implementation of a threshold ecdsa signature scheme based on a secure multi-party computation (MPC) protocol for evaluating …☆30Updated last year
- Experimental folding schemes library☆260Updated last month
- ☆194Updated last month
- A curated list of zero-knowledge folding schemes☆306Updated last year
- Middleware to compile Circom circuits to Nova prover☆245Updated last year
- Accelerate Early Stage Programmable Cryptography Talents☆113Updated last year
- Circom Circuits Library for Machine Learning☆181Updated last year
- Created for Web3 builders☆32Updated 2 years ago
- educational python plonk implementation, based on vitalik's py_plonk☆222Updated last year
- Multi-party computation libraries written in Rust 🦀☆284Updated last week
- ☆330Updated last month
- List of halo2-related resources☆203Updated last year
- A STARK-based VM focused on code reuse, performance, and modularity☆338Updated 6 months ago
- ☆238Updated 6 months ago
- ☆204Updated 2 years ago
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆114Updated last year
- State-of-the-art Elliptic Curve operations and SNARKS verification for Cairo & Starknet 🐺.☆251Updated last week
- Introduction to various ZK languages☆89Updated 4 months ago
- A curated list of zkVM, zero-knowledge virtual machine☆300Updated 4 months ago
- ☆266Updated last year
- ☆81Updated last year
- Expander, an open-source GKR prover designed for scaling large-scale parallel computing.☆141Updated last week