Authenticated key-value store (i.e. an urkel tree)
☆316Feb 24, 2023Updated 3 years ago
Alternatives and similar repositories for liburkel
Users that are interested in liburkel are comparing it to the libraries listed below
Sorting:
- Authenticated multi-version database: sparse binary merkle tree with compact partial-tree proofs☆320Feb 9, 2023Updated 3 years ago
- Cryptographically provable database (i.e. an urkel tree)☆126Jan 22, 2023Updated 3 years ago
- calculate new mpt root without loading entire trie☆17Jun 19, 2024Updated last year
- Shared peer-to-peer network of zero-knowledge provers☆16Dec 5, 2024Updated last year
- All-inclusive Buffer for C☆415Nov 16, 2023Updated 2 years ago
- wall time exex for reth☆12Aug 5, 2024Updated last year
- A minimal stack-based VM☆182Sep 10, 2020Updated 5 years ago
- BLST-Verification☆23Jan 22, 2026Updated last month
- Bitcoin node written in C☆595Aug 16, 2024Updated last year
- a 64-bit histogram / quantile sketch☆59Jan 6, 2025Updated last year
- Non-preemptive Thread Hierarchy Manager☆56Oct 26, 2024Updated last year
- Generalized EIP-3074 Invoker with batch transaction support.☆17Apr 27, 2024Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Password encrypted overlay to Random Access modules☆16Apr 5, 2022Updated 3 years ago
- An all-in-one solution for proving that a beacon block is a predecessor of another beacon block.☆17Sep 10, 2024Updated last year
- ☆54Jun 7, 2025Updated 8 months ago
- Minimal Merkle Tree implementations☆31Jun 13, 2025Updated 8 months ago
- A rapidly-updated list of live phishing domains for consumption by the eth-phishing-detect module☆16Aug 10, 2022Updated 3 years ago
- inscriptions lol☆16Dec 24, 2023Updated 2 years ago
- Rust implementation of the Modified Patricia Tree (aka Trie).☆72Mar 7, 2024Updated last year
- Ed25519 suitable for use in consensus-critical contexts.☆54Aug 1, 2024Updated last year
- Optimised bilinear pairings over elliptic curves☆56Feb 3, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ULID Library for C☆66Jan 17, 2020Updated 6 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A ziglang implementation of the SSZ serialization protocol☆31Updated this week
- Delve into low-level RISC Zero machine☆30Dec 25, 2023Updated 2 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- Anonymous decentralized message broadcasting based on Libp2p and Dandelion++☆18Apr 12, 2020Updated 5 years ago
- Zig EVM☆34Nov 22, 2025Updated 3 months ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42May 23, 2025Updated 9 months ago
- Graviton Database: ZFS for key-value stores.☆424Jan 30, 2022Updated 4 years ago
- ☆16Feb 9, 2026Updated 2 weeks ago
- stateless model checking for thread libraries, kernels, and transactional memory☆10Dec 26, 2018Updated 7 years ago
- Howitzer is a Fault Proof VM based on the MIPS64 architecture☆14Sep 4, 2024Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago