nerolation / EIP-Stealth-Address-ERCLinks
☆57Updated 2 years ago
Alternatives and similar repositories for EIP-Stealth-Address-ERC
Users that are interested in EIP-Stealth-Address-ERC are comparing it to the libraries listed below
Sorting:
- Extension for zk succinct non-interactive ownership proofs.☆40Updated 3 years ago
- ☆89Updated 3 years ago
- Memory access with runtime typechecking in Solidity☆76Updated 2 years ago
- ☆47Updated 2 years ago
- Smart contracts for the Telepathy protocol☆80Updated last year
- Testing EIP-4844 on EL and CL clients☆57Updated 2 years ago
- Tool for computing vanity Safe addresses☆79Updated 10 months ago
- ☆92Updated last year
- Account2 is three things: - Account Abstraction (AA) - Economic Abstraction (EA) - Account Linking☆79Updated 3 years ago
- ☆79Updated 3 years ago
- ☆40Updated 7 months ago
- zkGames is a platform that allows users to play zk (zero knowledge) games and mint an NFT as proof that they have won.☆69Updated 3 years ago
- Governor of Athens: A protocol to enable private governance on existing governor bravo contracts by leveraging Aztec's Defi Batching☆86Updated 3 years ago
- Library for checked-in, targeted gas snapshots with forge☆97Updated last year
- Cross chain governance libraries for rollups☆76Updated 3 years ago
- Social Recovery Wallet that hides the identities of Guardians until recovery.☆48Updated 3 years ago
- EIP-3074 (`AUTH` and `AUTHCALL` opcodes) example foundry project☆75Updated last year
- ZK Erdos Numbers using recursive SNARKs☆78Updated 3 years ago
- Ultimate Boilerplate for building full stack ZK decentralized application, with Circom, Snarkjs and Nextjs☆47Updated 3 years ago
- Upgradeable Contracts using the Diamond Storage pattern.☆50Updated 2 years ago
- Shield is a development framework for circom developers. The core reason is to provide libraries, plugins, and testing tools to ensure co…☆59Updated 3 years ago
- A stablecoin-based zkprotocol designed for simplicity, privacy and utility☆74Updated last year
- Simple module to control a Safe via crosschain calls with Hashi☆27Updated last year
- 🐮 🧾 Composable Conditional Orders for CoW Protocol☆64Updated last week
- Leveraging zk for trustlessly selling private keys, signatures and groth16 proofs.☆93Updated 2 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 9 months ago
- Trustlessly prove a past storage value in a contract to other contracts☆145Updated 2 years ago
- Extremely performant EVM oracle utilizing aggregated Schnorr signatures☆58Updated 5 months ago
- zkSudoku is a platform that allows users to play zk (zero knowledge) Sudoku games.☆46Updated 2 years ago
- The simplest way to spin your own dev / prod rollup, fully configurable.☆98Updated last year