Universal covert privacy-enhancing transactions for any blockchain that supports ECDSA or Schnorr
☆29Jan 8, 2023Updated 3 years ago
Alternatives and similar repositories for spy-pets
Users that are interested in spy-pets are comparing it to the libraries listed below
Sorting:
- ☆13Aug 22, 2022Updated 3 years ago
- efficient modular multiplication research☆15Feb 8, 2023Updated 3 years ago
- Cryptographic protocols☆38Apr 19, 2023Updated 2 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Jan 2, 2023Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A STARK-friendly elliptic curve defined over a sextic extension of a small prime field.☆40Dec 5, 2023Updated 2 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- ☆13Sep 17, 2022Updated 3 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- A Solidity implementation of Halo2's Pasta curves☆50Mar 30, 2023Updated 2 years ago
- implentation of Ligerito☆19Nov 9, 2025Updated 3 months ago
- ☆11Feb 6, 2024Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆14May 3, 2019Updated 6 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- Curated list of rollups on Ethereum and their security guarantees.☆13Feb 3, 2021Updated 5 years ago
- Exploring mempool listening methods☆25Mar 4, 2022Updated 3 years ago
- Research prototypes of Data Availability Sampling for Ethereum (WIP)☆15Dec 20, 2022Updated 3 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- ☆15May 27, 2021Updated 4 years ago
- Where I create DAS Nodes that utilize a Secure Kademlia DHT Discv5 overlay☆16May 5, 2023Updated 2 years ago
- A basic example for how to use hashes to "store" complex objects as hashes. Inspired by 0xSplits.☆13Jul 30, 2022Updated 3 years ago
- An active, public list of project ideas related to NFCxZK☆11Dec 6, 2023Updated 2 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated last year
- ☀️☆12Aug 24, 2022Updated 3 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Dec 18, 2022Updated 3 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Feb 16, 2024Updated 2 years ago
- Share private EVM state attestations using STARK proofs☆73Aug 4, 2022Updated 3 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- evm playground - optimizations, patterns and bytecode decoding☆15Dec 29, 2022Updated 3 years ago
- ☆14May 19, 2022Updated 3 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 5 years ago
- An instantiation of the Poseidon hash for use with decaf377☆29Mar 6, 2025Updated 11 months ago
- Evaluating & benchmarking ZKP compilation strategies.☆121Dec 19, 2023Updated 2 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago