anoma / ferveoLinks
An implementation of a DKG protocol for front-running protection on Anoma.
☆83Updated 2 years ago
Alternatives and similar repositories for ferveo
Users that are interested in ferveo are comparing it to the libraries listed below
Sorting:
- The multi-asset shielded pool (MASP) provides a unified privacy set for all assets on Namada.☆92Updated last month
- Formalization of Typhon protocol☆31Updated 11 months ago
- Secure SGX Sidecar for CosmWasm☆59Updated 3 weeks ago
- Implementation of the Zcash Orchard Protocol☆63Updated this week
- Tower-based ABCI interface.☆78Updated 10 months ago
- A framework for generalized shielded state transitions☆150Updated last year
- Celestia Specifications☆49Updated 3 years ago
- Configurable Asset Privacy☆35Updated last year
- Vamp-IR is a proof-system-agnostic language for writing arithmetic circuits☆163Updated 2 years ago
- Pure Rust implementation of the PLONK ZKProof System done by the Dusk-Network team.☆14Updated 3 years ago
- Early-stage research related to the Anoma protocols.☆35Updated 2 years ago
- Implementation of Canetti-Gennaro-Goldfeder-Makriyannis-Peled threshold signing scheme☆82Updated 2 months ago
- Evaluating & benchmarking ZKP compilation strategies.☆121Updated last year
- EIP1962 implementation effort☆71Updated last year
- Implements SNARK-friendly BLS signatures☆87Updated last year
- ☆38Updated 4 years ago
- Advanced fuzzing via Model Based Testing for Cosmos blockchains☆84Updated 2 years ago
- In-EVM Mina State Verification☆81Updated 2 years ago
- Aggregatable Distributed Key Generation☆49Updated 3 years ago
- Recursive SNARKs based on Plonk and Halo☆116Updated 4 years ago
- Implementation of zero-knowledge proof circuits for Tendermint.☆82Updated last year
- A generalized fully trustless Ethereum bridge for sovereign chains.☆14Updated 2 years ago
- Rust implementation for zcash/pasta☆84Updated 7 months ago
- Building generic merkle proof format for IBC☆127Updated 4 months ago
- Tendermint in Solidity☆61Updated 3 years ago
- New repo: https://github.com/privacy-scaling-explorations/perpetualpowersoftau☆134Updated last year
- Slides and notes for "Halo Optimizations and Constructing Graphs of Elliptic Curves"☆49Updated 3 years ago
- Implementation of Sunny's Mesh Security talk (Hackathon / Prototype status)☆88Updated 2 years ago
- A trust-minimized cross-chain execution environment.☆14Updated last month
- C++ elliptic curve library☆135Updated 2 years ago