Zero-knowledge Range Proof
☆17Nov 16, 2017Updated 8 years ago
Alternatives and similar repositories for zkrangeproof
Users that are interested in zkrangeproof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- egg graphql plugin☆10Apr 12, 2022Updated 4 years ago
- An Efficient and Privacy preserving implementation for the Set membership problem using Rsa Accumulators coupled with Commit-Prove-Snark☆12Feb 24, 2024Updated 2 years ago
- Solidity从入门到入土☆63Jun 11, 2021Updated 4 years ago
- HashWires is a range proof system for credentials issued by a trusted third party.☆20Jan 28, 2022Updated 4 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Feb 13, 2020Updated 6 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- WASM wrapper over the crypto library☆22Dec 18, 2025Updated 4 months ago
- ☆13Apr 26, 2016Updated 10 years ago
- Rust library for efficient, succinct and modular set membership and non-membership proofs☆57Mar 19, 2021Updated 5 years ago
- ECNU Undergraduate Dissertation Template 2024☆14Mar 13, 2024Updated 2 years ago
- Droplet: Decentralized Authorization for IoT Data Streams☆15May 22, 2023Updated 2 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- The Decentralized Protocol for Interest-Rate Derivatives & Fixed-Rate Lending☆11May 7, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Feb 2, 2021Updated 5 years ago
- The implementation of Ciphertext Policy Attribute Based Encryption in Java.☆18Dec 22, 2014Updated 11 years ago
- 🐍 Vyper language support in Atom☆11Mar 24, 2022Updated 4 years ago
- Prima JWKS-sync client implementation for Auth0☆10Apr 21, 2026Updated last week
- Sublinear-space ZKP system in Rust: a streaming prover that uses only O(√T) memory to commit wires/Z/Q via KZG (BN254) with blocked IFFT …☆49Nov 12, 2025Updated 5 months ago
- A salmonella token built with foundry☆20Apr 11, 2022Updated 4 years ago
- This tool uses Ethereum's peer-discovery protocol to measure the size of the Ethereum network (testnets included)☆15Dec 15, 2022Updated 3 years ago
- Demo, tutorial, and benchmarks for the SAPL policy engine☆16Updated this week
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆21Jul 14, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ElGamal encryption and related zero-knowledge proofs☆17Apr 21, 2026Updated last week
- Using NFT (Non-fungible tokens) and Zero Knowledge to enable privacy and traceability of data sharing on the Blockchain☆11Jul 12, 2023Updated 2 years ago
- Ethereum pre-sale wallet sweeper.☆14Nov 17, 2025Updated 5 months ago
- Non-fungible token for tracking recursive licensing☆10Jul 8, 2025Updated 9 months ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 6 years ago
- F* proofs of Ethereum☆10Sep 17, 2021Updated 4 years ago
- ☆10Apr 24, 2024Updated 2 years ago
- 打包后的自动跟单程序☆10Jun 16, 2023Updated 2 years ago
- TypeScript/node reference implementation of BBS signature☆23Jan 22, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An implementation of the Rift Protocol in Solidity☆15Jan 9, 2023Updated 3 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- A Noir's backend implementation using Gnark☆35Mar 8, 2024Updated 2 years ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- bbs04 signature in golang☆16Jan 2, 2019Updated 7 years ago
- programmable on-chain identity primitive protocol☆13Jun 23, 2022Updated 3 years ago
- Authentication / Authorization server example with Rust, Warp, Postgres☆11Nov 9, 2020Updated 5 years ago