axiom-crypto / axiom-apps
☆34Updated last year
Alternatives and similar repositories for axiom-apps:
Users that are interested in axiom-apps are comparing it to the libraries listed below
- an introduction to noir, with simple examples☆45Updated last year
- Axiom smart contracts☆26Updated last year
- ☆28Updated last year
- ☆18Updated 2 years ago
- zkSNARK circuits for the Telepathy protocol☆53Updated last year
- ERC4337-based social recovery wallet with Noir zk-ecdsa☆21Updated last year
- Noir implementation of BattleZips circuits☆27Updated last year
- Trust-minimized commitment pools with zkSNARKs☆39Updated 2 years ago
- BigInt library for Aztec's noir language☆32Updated last year
- ☆31Updated last year
- storage proof made by sp1☆24Updated 6 months ago
- ☆33Updated last year
- A Solidity implementation of Halo2's Pasta curves☆49Updated 2 years ago
- bn254 pairing library for Cairo Zero☆26Updated 2 years ago
- Ethereum stateless tools☆46Updated last week
- An efficient implementation of ECDSA on secp256r1 in Cairo☆23Updated last year
- ☆40Updated 2 years ago
- Infinitely Compressible Governance using Recursive SNARKs☆31Updated 2 years ago
- A convenient way for developers to compile, cache, and execute circom circuits, as well as to generate proofs.☆34Updated 2 years ago
- ☆28Updated 3 years ago
- Scikit-learn compatible Python library for generating ZK proofs of execution☆18Updated last month
- Hackathon for EthBogota - An Eth2 light client using Cannon verifyable computation☆30Updated 2 years ago
- Trustless oracle of historical Uniswap v3 TWAP using ZK☆38Updated last year
- client side proving☆28Updated last month
- A simple merkle distributor written in Cairo☆38Updated 2 years ago
- An example of how to build an end-to-end dApp with plonky2x☆22Updated last year
- A graph library built with Cairo☆28Updated 2 years ago
- Tiny CLI for submitting large calldata transactions to EVM networks to stress test the networking layer. Main motivation: EIP4844blobs.☆55Updated 2 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- 🔒💬 A protocol for credible commitments.☆75Updated last year