arnaucube / go-bellman-verifierLinks
Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing
☆13Updated 5 years ago
Alternatives and similar repositories for go-bellman-verifier
Users that are interested in go-bellman-verifier are comparing it to the libraries listed below
Sorting:
- Elliptic curve search experiments☆35Updated 2 years ago
- Notes for the R1CS programming workshop at ZK0x04☆31Updated 6 years ago
- snarkpack for arkwork☆21Updated 2 years ago
- ☆19Updated 5 years ago
- Pairing-friendly elliptic curve library☆24Updated last year
- Decentralised Voting Scheme☆16Updated 4 years ago
- ☆19Updated 2 years ago
- An implementation of Sangria☆17Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 3 years ago
- [wip] implementing origami VDF☆13Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 4 years ago
- Open-Source Libraries for Circom by ABDK Consulting☆19Updated 6 years ago
- ☆30Updated 3 years ago
- Solidity implementation of the baby jubjub curve☆21Updated last year
- A list of worth-reading articles about Cryptohraphy☆16Updated last year
- Draft documents for standardization of Plonkish arithmetization☆23Updated last year
- R1CS constraints for non-native field arithmetic☆21Updated 4 years ago
- FRI low-degree-testing & polynomial commitment scheme☆24Updated 2 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Updated 2 years ago
- ☆11Updated last year
- ☆15Updated 5 years ago
- LegoGroth16 implementation on top of Zexe☆25Updated 4 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Updated last year
- ☆23Updated 5 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 4 years ago
- Early prototype.☆23Updated 2 years ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Updated 2 years ago
- ☆15Updated 4 years ago
- ☆16Updated last year
- Implementations of proof-carrying data☆36Updated 3 years ago