☆23Dec 8, 2025Updated 3 months ago
Alternatives and similar repositories for phantom
Users that are interested in phantom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Verifiable FHE with GKR☆27Oct 5, 2024Updated last year
- ☆132Dec 23, 2024Updated last year
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Feb 16, 2024Updated 2 years ago
- A library for lattice-based multiparty homomorphic encryption in Go☆14Dec 20, 2024Updated last year
- A backend agnostic modular FHE library over the Torus using bivariate polynomial representation☆56Mar 12, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A list of worth-reading articles about Cryptohraphy☆16Jul 24, 2024Updated last year
- ☆15Feb 14, 2024Updated 2 years ago
- MerkleTree compatible with circomlib☆12Feb 24, 2026Updated last month
- implentation of Ligerito☆19Nov 9, 2025Updated 4 months ago
- Privacy and Scaling Explorations☆11Sep 20, 2023Updated 2 years ago
- Using folding schemes for a provable bitcoin light client☆34May 22, 2024Updated last year
- Polycircuit is an FHE components library built via FHERMA competitions☆21Jul 10, 2025Updated 8 months ago
- ☆22Oct 18, 2022Updated 3 years ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Mar 18, 2026Updated last week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Fast zkVM born at a16z Crypto substantially adapted by ICME Labs (NovaNet) for verifiable machine learning. ⚡☆53Updated this week
- C implementation of Libp2p☆28Updated this week
- A monorepo for vOPRF-based secure nullifiers☆22Apr 13, 2025Updated 11 months ago
- A modded Prolly-tree implementation in Typescript☆15Oct 6, 2025Updated 5 months ago
- ☆20Dec 30, 2025Updated 2 months ago
- High-performance Multi-scalar Multiplication for Pasta curves☆24Sep 6, 2025Updated 6 months ago
- pod2 & spec☆22Mar 18, 2026Updated last week
- SMT 2023 Submission; license pending☆57Jan 28, 2026Updated last month
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆13Nov 1, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- RISCU emulator and zk circuit simulator as a reference for a Jolt implementation☆23Dec 11, 2023Updated 2 years ago
- Client side zero-knowledge proving.☆102Updated this week
- Oblivious key-value store based on Circuit ORAM☆37Mar 22, 2025Updated last year
- ☆12May 24, 2022Updated 3 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 4 months ago
- Typescript implementation of Yamux☆17Mar 4, 2026Updated 3 weeks ago
- Plonky2 Semaphore example for ZKHack☆26Mar 8, 2022Updated 4 years ago
- ☆31Oct 27, 2025Updated 5 months ago
- ☆13Aug 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Minimal zkVM, targeting aggregation of hash-based signatures.☆77Mar 19, 2026Updated last week
- Verify blockchain data presented at popular websites using Light Client technology☆11Nov 24, 2024Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 3 years ago
- Extractable Witness Encryption for KZG Commitments☆32Nov 29, 2024Updated last year
- ☆10Nov 1, 2024Updated last year
- ☆33Feb 14, 2025Updated last year
- A FRI verifier circuit for the Halo2 proof system☆77Feb 22, 2023Updated 3 years ago