bkomuves / hash-circuitsLinks
Hashing circuits implemented in circom
☆26Updated 9 months ago
Alternatives and similar repositories for hash-circuits
Users that are interested in hash-circuits are comparing it to the libraries listed below
Sorting:
- Nova Verifier in Circom so it can be verified onChain☆59Updated 2 years ago
- ☆63Updated last month
- Nova-based SHA256 benchmarks☆31Updated 4 months ago
- ☆25Updated 7 months ago
- ECDSA P384 implementation for circom☆17Updated last year
- zero knowledge proof aggregator for general circuit☆72Updated last year
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆56Updated 2 months ago
- rapidsnark is a fast zkSNARK prover written in C++, that generates proofs for circuits created with circom and snarkjs.☆13Updated last year
- Verify JWTs using SNARK circuits☆29Updated last year
- In-browser ECDSA aggregation using Nova over secp/secq☆35Updated 2 years ago
- Reusable component to add a designated verifier to your zk circom circuit. It means that the zk proof generated from your circuit cannot …☆41Updated 2 years ago
- Verify a chain of x509 certificates in halo2☆31Updated last year
- ☆26Updated last year
- In this repo we will construct a POC implementation of the MLE sumcheck end-end in a GPU☆39Updated 8 months ago
- Frobenius sumcheck for vectorized boolean ops☆56Updated 6 months ago
- ☆30Updated last month
- Solidity implementation of Nova proving system verifier☆64Updated last year
- ZK proofs for image authenticity☆47Updated 3 weeks ago
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆49Updated 2 years ago
- ☆41Updated last year
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- Library and gadget to do regex string matches in halo2☆35Updated last year
- ☆80Updated 9 months ago
- A PoC repo for a HyperNova impl☆83Updated 2 years ago
- ☆50Updated last year
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆113Updated last year
- polynomial commitments from linear codes☆46Updated 10 months ago
- Verifiable and confidential computation based on ZKP and FHE, powered by risc0 zkVM.☆84Updated 2 years ago
- ☆22Updated last year
- Benchmark of multiple zk implementations.☆83Updated 2 years ago