nulltea / zk-timelock
Arkworks circuits for verifiable time-lock encryption
☆88Updated 2 years ago
Alternatives and similar repositories for zk-timelock:
Users that are interested in zk-timelock are comparing it to the libraries listed below
- Cross-zk-rollup aggregation☆60Updated 2 years ago
- PoC of Revm execution in SGX☆79Updated last year
- Minimal Yul Transpilation to the Miden VM☆53Updated 2 years ago
- Share private EVM state attestations using STARK proofs☆72Updated 2 years ago
- Shield is a development framework for circom developers. The core reason is to provide libraries, plugins, and testing tools to ensure co…☆60Updated 2 years ago
- ☆64Updated 2 months ago
- https://geometryresearch.xyz/notebook/zkhack-groth-challenge☆49Updated 2 years ago
- ☆45Updated last year
- Crypto Gadgets for Plonky2☆72Updated 10 months ago
- My personal notebook for various zk-related topics☆48Updated 2 months ago
- Tiny CLI for submitting large calldata transactions to EVM networks to stress test the networking layer. Main motivation: EIP4844blobs.☆55Updated 2 years ago
- Client library for generating and using RLN ZK proofs☆30Updated last year
- zkSNARK circuits for the Telepathy protocol☆53Updated last year
- ☆37Updated 5 months ago
- Ultimate Boilerplate for building full stack ZK decentralized application, with Circom, Snarkjs and Nextjs☆46Updated 2 years ago
- FHE in the Risc0 zkVM☆25Updated last year
- ☆36Updated 3 years ago
- Verifiable RPC for Ethereum state, in-browser, no node☆45Updated 2 years ago
- ☆46Updated 3 years ago
- Nova: Recursive SNARKs without trusted setup☆43Updated last year
- Splitting seed phrases into shares☆63Updated 2 years ago
- Gas-efficient and blazing fast proving for private signaling☆81Updated last year
- Serverless function on Reth☆72Updated 7 months ago
- Email verification circuit in halo2☆68Updated 8 months ago
- Cryptographic protocols☆38Updated last year
- Ethereum stateless tools☆46Updated last month
- an introduction to noir, with simple examples☆43Updated last year
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- Using folding schemes for a provable bitcoin light client☆33Updated 10 months ago
- ZK-based engine for self-sovereign SQL queries☆89Updated 2 years ago