nerolation / EIP-Stealth-Address-ERCLinks
☆57Updated 2 years ago
Alternatives and similar repositories for EIP-Stealth-Address-ERC
Users that are interested in EIP-Stealth-Address-ERC are comparing it to the libraries listed below
Sorting:
- Extension for zk succinct non-interactive ownership proofs.☆40Updated 3 years ago
- Testing EIP-4844 on EL and CL clients☆57Updated 2 years ago
- Smart contracts for the Telepathy protocol☆79Updated last year
- ☆40Updated 6 months ago
- 🐮 🧾 Composable Conditional Orders for CoW Protocol☆63Updated last week
- Tool for computing vanity Safe addresses☆79Updated 9 months ago
- Governor of Athens: A protocol to enable private governance on existing governor bravo contracts by leveraging Aztec's Defi Batching☆86Updated 3 years ago
- Ultimate Boilerplate for building full stack ZK decentralized application, with Circom, Snarkjs and Nextjs☆47Updated 3 years ago
- Memory access with runtime typechecking in Solidity☆75Updated 2 years ago
- ☆47Updated 2 years ago
- ☆89Updated 3 years ago
- Shield is a development framework for circom developers. The core reason is to provide libraries, plugins, and testing tools to ensure co…☆59Updated 2 years ago
- Account2 is three things: - Account Abstraction (AA) - Economic Abstraction (EA) - Account Linking☆79Updated 3 years ago
- EIP-3074 (`AUTH` and `AUTHCALL` opcodes) example foundry project☆75Updated last year
- ☆79Updated 3 years ago
- zkGames is a platform that allows users to play zk (zero knowledge) games and mint an NFT as proof that they have won.☆69Updated 3 years ago
- Extremely performant EVM oracle utilizing aggregated Schnorr signatures☆57Updated 4 months ago
- A stablecoin-based zkprotocol designed for simplicity, privacy and utility☆75Updated last year
- Cross chain governance libraries for rollups☆76Updated 3 years ago
- Bundler specification test suites☆80Updated 8 months ago
- Library for checked-in, targeted gas snapshots with forge☆97Updated last year
- ZK Erdos Numbers using recursive SNARKs☆79Updated 3 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 8 months ago
- SUAVE Application Examples☆57Updated last year
- Tribunal is a framework for processing cross-chain swap settlements utilizing The Compact.☆62Updated 3 weeks ago
- Simple module to control a Safe via crosschain calls with Hashi☆27Updated last year
- 🔌 Preconfirmations protocol for sub-second transaction confirmations on Ethereum.☆60Updated last year
- ☆47Updated 2 years ago
- ☆91Updated last year
- Paper: Data Representation in Solidity☆61Updated 2 years ago