eth-sri / zapper
☆18Updated 2 years ago
Alternatives and similar repositories for zapper:
Users that are interested in zapper are comparing it to the libraries listed below
- Geth-in-SGX provides an example of running go-ethereum in SGX☆75Updated 11 months ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆83Updated last year
- ☆59Updated 3 years ago
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆74Updated last year
- Libra zero knowledge proof system☆48Updated last year
- ☆195Updated last year
- Prototype implementations of various Collaborative zkSNARKs.☆122Updated 11 months ago
- ☆21Updated 6 months ago
- Ecne: An engine for verifying the soundness of R1CS constraints☆110Updated 2 years ago
- ☆59Updated 2 years ago
- Reef: A zkSNARK system for proving that a committed document matches a regex☆68Updated 8 months ago
- ☆68Updated last month
- Automated verification of uniqueness property for ZKP circuits☆73Updated 11 months ago
- Circom Circuits Library for Machine Learning☆169Updated 8 months ago
- The implementation of Pianist (a distributed variant of Plonk) based on gnark.☆33Updated last year
- ☆14Updated 5 years ago
- ☆82Updated last year
- ☆63Updated 2 years ago
- ☆24Updated 2 years ago
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆38Updated 4 years ago
- zkInterface is a protocol for the interoperability of zero-knowledge frameworks.☆126Updated last year
- Big integer arithmetic // secp256k1 & additional P256 ECC operations in circom☆13Updated last year
- Efficient and Interactive Zero-Knowledge Proofs☆86Updated last year
- ED25519 implementation in Circom☆112Updated last year
- This archived repository lacks recent updates. Developers seeking an actively maintained alternative should consider ethereum/py_ecc☆110Updated 2 months ago
- C++ library for IOP-based zkSNARKs☆157Updated last year
- A python implementation of sumcheck GKR protocol. Reference: https://eprint.iacr.org/2019/317.pdf☆9Updated 4 years ago
- zkp-co-learning☆60Updated 2 months ago
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆110Updated 11 months ago
- Xscope: Hunting for Cross-Chain Bridge Attacks☆13Updated 2 years ago