iden3 / ffiasm-old
Intel assembly finite field library generator
☆12Updated last year
Alternatives and similar repositories for ffiasm-old:
Users that are interested in ffiasm-old are comparing it to the libraries listed below
- ☆14Updated 3 years ago
- fft impl for ff::Field☆15Updated 8 months ago
- Vectorized AVX-512 256-bit arithmetic library☆30Updated 3 months ago
- RLN wrappers and implementation in Go☆11Updated 3 years ago
- Web Assembly low level implementation of pairing friendly curves.☆16Updated 8 months ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Updated 3 years ago
- ☆15Updated 4 years ago
- R1CS constraints for non-native field arithmetic☆20Updated 3 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆15Updated 4 years ago
- ☆12Updated 4 years ago
- Starky implementation of Bls12-381☆12Updated 8 months ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- ☆18Updated 4 years ago
- ☆11Updated 11 months ago
- ☆26Updated 2 years ago
- ☆18Updated last year
- Smart contracts for OPRHub protocol ✌🏻☆12Updated 4 years ago
- circom runtime☆20Updated 3 months ago
- [wip] implementing origami VDF☆13Updated last year
- https://eprint.iacr.org/2020/1516.pdf☆19Updated 2 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Updated 3 years ago
- A note on multivariate lookup arguments☆10Updated 2 years ago
- ☆15Updated 3 years ago
- Rust implementation of {t,n}-threshold ECDSA (elliptic curve digital signature algorithm).☆10Updated 5 years ago
- Blind signatures over elliptic curve implementation (native & r1cs constraints).☆13Updated 2 years ago
- Experiments for "Goldfish: No More Attacks on Proof-of-Stake Ethereum"☆13Updated last year
- Huff implementation of the BabyJubJub curve☆13Updated 5 years ago
- ☆28Updated last year