SoundnessLabs / sp1-suiLinks
A SP1 Groth16 Proof Verifier for Sui
☆75Updated 4 months ago
Alternatives and similar repositories for sp1-sui
Users that are interested in sp1-sui are comparing it to the libraries listed below
Sorting:
- A simple aztec contract + test to get started.☆111Updated last week
- ☆180Updated 3 weeks ago
- Solidity Contracts that allow developers to use FHE on Fhenix☆75Updated 11 months ago
- ☆125Updated last week
- Aligned is a verification layer for zero-knowledge proofs using EigenLayer. Our mission is to accelerate the adoption of zero-knowledge a…☆277Updated last week
- Monad Configured Foundry template☆62Updated last month
- ☆30Updated 9 months ago
- ☆418Updated this week
- Monorepo for Boundless, the universal ZK protocol.☆182Updated this week
- RedStone Oracles documentation☆51Updated last week
- A tool for depositing Ether into the Eclipse rollup☆114Updated last year
- Everything required to run your own Unichain node☆204Updated last week
- ☆48Updated 4 months ago
- Multi-proofs for Taiko. SNARKS, STARKS and Trusted Execution Enclave. Our previous ZK-EVM circuits are deprecated.☆152Updated this week
- Ten Documentation provides a comprehensive guide to understanding and integrating TEN☆32Updated 2 weeks ago
- An example counter app on Nexus☆35Updated 10 months ago
- An L1 for Move VM built on Avalanche.☆74Updated last year
- Boojum, the scariest SNARK implementation.☆302Updated last year
- UI for Eclipse Bridge (Tesnet/Mainnet)☆55Updated 9 months ago
- Zircuit Mainnet Ceremony☆47Updated last year
- ☆45Updated this week
- core protocol repo for mainnet launch☆190Updated last week
- ☆40Updated last year
- Intuition Protocol Whitepaper☆63Updated last month
- A collection of configs, artifacts, and schemas for Hyperlane☆94Updated last week
- An auditable, tamper-resistant reputation scoring framework built on verifiable credentials and transparent algorithms.☆30Updated 2 months ago
- ☆29Updated last week
- Ika is a Zero-Trust threshold signature network, implementing 2PC-MPC to ensure the user is cryptographically required to generate a sign…☆193Updated this week
- ☆95Updated last week
- Movement Improvement Proposals☆16Updated last week