daira / tweedleLinks
Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo
☆20Updated 3 years ago
Alternatives and similar repositories for tweedle
Users that are interested in tweedle are comparing it to the libraries listed below
Sorting:
- Elliptic curve search experiments☆35Updated 2 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Updated 5 years ago
- Notes for the R1CS programming workshop at ZK0x04☆31Updated 6 years ago
- Fawkes-Crypto - zkSNARKs framework☆22Updated last year
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Updated 5 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 4 years ago
- ☆15Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 5 years ago
- Pairing-friendly elliptic curve library☆24Updated last year
- Implementations of proof-carrying data☆37Updated 3 years ago
- ☆19Updated 5 years ago
- LegoGroth16 implementation on top of Zexe☆25Updated 4 years ago
- R1CS constraints for non-native field arithmetic☆21Updated 4 years ago
- ☆30Updated 3 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Updated 2 years ago
- Describe elliptic curves☆35Updated 4 years ago
- Argument systems for inner pairing products☆43Updated last year
- Decentralised Voting Scheme☆16Updated 4 years ago
- ☆27Updated 3 years ago
- ☆41Updated 3 years ago
- Polymath: Groth16 Is Not The Limit☆31Updated 11 months ago
- fft impl for ff::Field☆17Updated last year
- A program for creating and verifying zkSNARKs to prove the results of Orbis smart contract executions and other TinyRAM program execution…☆39Updated 3 years ago
- ☆15Updated 4 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Updated 3 years ago
- ☆11Updated last year
- Simple implementation of KZG commitments in C☆36Updated 3 years ago
- ☆15Updated 4 months ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 4 years ago
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆59Updated 2 years ago