l2iterative / ll0
Delve into low-level RISC Zero machine
☆27Updated last year
Alternatives and similar repositories for ll0:
Users that are interested in ll0 are comparing it to the libraries listed below
- In-browser ECDSA aggregation using Nova over secp/secq☆33Updated last year
- RLN on KZG☆20Updated last year
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆30Updated last year
- A Solidity implementation of Halo2's Pasta curves☆49Updated 2 years ago
- polynomial commitments from linear codes☆41Updated 4 months ago
- Arkworks made simple for us: the non cryptographer software plumbers☆22Updated 2 years ago
- Implementation of the Grumpkin curve in Rust.☆29Updated last year
- ☆17Updated 2 years ago
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Updated 2 years ago
- ☆50Updated last year
- A collection of comparison-benchmarks for Nova & related Proving systems☆43Updated 2 years ago
- An example of how to build an end-to-end dApp with plonky2x☆22Updated last year
- Prove multi-opens of EIP-4844 KZG blobs☆14Updated last year
- Implementation of Nova using arkworks for learning purposes. https://eprint.iacr.org/2021/370.pdf☆45Updated last year
- Based on https://eprint.iacr.org/2022/1510☆24Updated 5 months ago
- ☆28Updated 3 years ago
- A collection of the Notes on the Nova folding scheme explained from scratch☆28Updated 10 months ago
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆47Updated last year
- Polynomial Expression Engine☆35Updated last year
- compiler tooling for Stark-based zkVMs☆16Updated 2 years ago
- Using folding schemes for a provable bitcoin light client☆34Updated 10 months ago
- Benchmarking Polynomial Commitments☆49Updated last year
- A STARK-friendly elliptic curve defined over a sextic extension of a small prime field.☆39Updated last year
- ☆18Updated last week
- A Cairo VM prover implemented using Winterfell☆16Updated last year
- client side proving☆28Updated last month
- STARK book☆20Updated 6 months ago
- Cryptographic protocols☆38Updated last year
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- ☆33Updated last year