dusk-network / Hades252Links
Implementation of the Hades permutation algorithm used in Poseidon Hashes with ZKProof capabilities.
☆22Updated last year
Alternatives and similar repositories for Hades252
Users that are interested in Hades252 are comparing it to the libraries listed below
Sorting:
- Rust library for accumulation schemes☆24Updated 2 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Updated 3 years ago
- ☆30Updated 2 years ago
- Vectorized AVX-512 256-bit arithmetic library☆34Updated last year
- Composable proof transcripts for public-coin arguments of knowledge☆49Updated last year
- A Rust library for proof-carrying disclosures☆21Updated last year
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Updated 2 years ago
- ☆31Updated 5 months ago
- Notes for the R1CS programming workshop at ZK0x04☆31Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Rescue and Poseidon hash function implementations☆43Updated last year
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Updated last year
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Updated 5 years ago
- [wip] implementing origami VDF☆13Updated 2 years ago
- ☆40Updated 2 years ago
- Pairing-friendly elliptic curve library☆24Updated last year
- Traits and utilities for working with finite fields☆18Updated last year
- R1CS constraints for non-native field arithmetic☆21Updated 4 years ago
- Polymath: Groth16 Is Not The Limit☆29Updated 7 months ago
- ☆42Updated last year
- Poseidon hash function☆76Updated 2 years ago
- Generator and supporting evidence for security of the Pluto/Eris half-pairing cycle of elliptic curves☆32Updated 4 years ago
- A collection of comparison-benchmarks for Nova & related Proving systems☆44Updated 2 years ago
- Decentralised Voting Scheme☆15Updated 3 years ago
- ☆27Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 4 years ago
- ☆42Updated 3 years ago
- ☆17Updated 6 months ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Updated 2 years ago
- A Sloth-based Verifiable Delay Function (VDF) evaluator and SNARK prover.☆17Updated 3 years ago