bcc-research / CryptoUtilitiesNotebooksLinks
Notebooks showing how to use CryptoUtilities
☆13Updated 7 months ago
Alternatives and similar repositories for CryptoUtilitiesNotebooks
Users that are interested in CryptoUtilitiesNotebooks are comparing it to the libraries listed below
Sorting:
- Curdleproofs is a zero-knowledge shuffle argument☆70Updated 2 years ago
- BN254 Pairing Implementation in Noir☆23Updated 2 years ago
- Early prototype.☆23Updated 2 years ago
- Benchmarking Polynomial Commitments☆50Updated 2 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Updated 2 years ago
- ☆27Updated 3 years ago
- ☆12Updated 2 years ago
- plonky2 implementation of bn254 pairing☆18Updated last year
- Implementation of the Grumpkin curve in Rust.☆29Updated 2 years ago
- A collection of comparison-benchmarks for Nova & related Proving systems☆44Updated 2 years ago
- ☆50Updated last year
- Compiler framework for ZK VMs☆35Updated 2 years ago
- Circuits for Pluto's `web-prover`☆24Updated 7 months ago
- ☆13Updated 2 years ago
- Based on https://eprint.iacr.org/2022/1510☆26Updated last year
- Prototype Rust implementation of hash-based signatures. See https://eprint.iacr.org/2025/055.pdf☆46Updated last week
- Extracting the semantics of Noir to Lean for formal verification☆33Updated this week
- Solidity libraries and contracts for verifying WHIR proofs on the EVM.☆27Updated 11 months ago
- A collection of technical notes from the Geometry research team.☆47Updated 2 years ago
- ☆28Updated 2 months ago
- polynomial commitments from linear codes☆47Updated 11 months ago
- ☆19Updated 2 years ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Updated 2 years ago
- FRI low-degree-testing & polynomial commitment scheme☆24Updated 2 years ago
- An example of how to build an end-to-end dApp with plonky2x☆22Updated 2 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Updated 2 years ago
- Arkworks made simple for us: the non cryptographer software plumbers☆23Updated 2 years ago
- ☆19Updated this week
- World's first implementation of a (possibly) secure witness encryption scheme. Uses the CLT13 multilinear map.☆35Updated 3 years ago
- ☆33Updated 2 years ago