Rollback protection for confidential services
☆33Dec 21, 2025Updated 2 months ago
Alternatives and similar repositories for Nimble
Users that are interested in Nimble are comparing it to the libraries listed below
Sorting:
- ☆11Sep 8, 2022Updated 3 years ago
- ☆58Jan 15, 2026Updated last month
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Batching zero over k checks☆11Feb 11, 2023Updated 3 years ago
- Testudo: Spartan + Groth16☆53Feb 21, 2024Updated 2 years ago
- Meeting notes, transcripts previous agendas and active working group items☆16Dec 6, 2024Updated last year
- Simple implementation of KZG commitments in C☆13Nov 19, 2022Updated 3 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- This is the code repository for QuePaxa project (formerly Raxos or QSCOD)☆36May 5, 2025Updated 9 months ago
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆46Updated this week
- Implementation of Nova using arkworks for learning purposes. https://eprint.iacr.org/2021/370.pdf☆45May 31, 2023Updated 2 years ago
- A support library for working with zero knowledge cryptography in Lean 4.☆48Aug 27, 2025Updated 6 months ago
- An example of how to build an end-to-end dApp with plonky2x☆22Aug 30, 2023Updated 2 years ago
- This rollup will only let you click the cookie☆21Aug 7, 2023Updated 2 years ago
- Implementations of algorithms and protocols from Justin Thaler's "Proofs, Arguments, and Zero-knowledge"☆21Feb 19, 2023Updated 3 years ago
- polynomial commitments from linear codes☆50Dec 13, 2024Updated last year
- ECFFT in Rust☆58Oct 3, 2023Updated 2 years ago
- ☆56Sep 16, 2025Updated 5 months ago
- MacTok is a research prototype for a one-time anonymous token scheme based on algebraic MACs.☆23Jan 20, 2023Updated 3 years ago
- Mutexes that only use two bits. Either stored in a byte, or in the bottom bits of a pointer☆26Dec 7, 2022Updated 3 years ago
- Share private EVM state attestations using STARK proofs☆73Aug 4, 2022Updated 3 years ago
- Verify JWTs using SNARK circuits☆29Jul 15, 2024Updated last year
- An instantiation of the Poseidon hash for use with decaf377☆29Mar 6, 2025Updated 11 months ago
- A CLI tool for interacting with SEV-SNP guest environment☆88Jan 23, 2026Updated last month
- Infinitely Compressible Governance using Recursive SNARKs☆31Sep 23, 2022Updated 3 years ago
- ☆34Feb 3, 2026Updated 3 weeks ago
- Polymath: Groth16 Is Not The Limit☆31Feb 6, 2025Updated last year
- Batch ECDSA in circom☆35Jul 20, 2022Updated 3 years ago
- Huff Proxies with Create2 (no SLOAD)☆41Oct 23, 2022Updated 3 years ago
- ☆30Feb 1, 2023Updated 3 years ago
- Synchronous fault-tolerant distributed algorithms encoded in TLA+☆33Jan 18, 2021Updated 5 years ago
- ☆41Aug 31, 2023Updated 2 years ago
- Javascript-powered Swype interface☆16Apr 15, 2013Updated 12 years ago
- ☆12Jun 30, 2025Updated 8 months ago
- 4D Miner C++ Modding Headers / 4D-Modding API Headers☆12Dec 31, 2025Updated 2 months ago
- Confidential Computing Consortium Governance Documents☆83Feb 19, 2026Updated last week
- Tool kit for building secure, scalable, and networked services on top of AWS Nitro Enclaves.☆51Updated this week
- An advanced fork of Nova (contact:@huitseeker)☆88Mar 3, 2025Updated 11 months ago
- Minecraft Redstone Compiler☆14Feb 9, 2025Updated last year