privacy-scaling-explorations / security
A collection of resources relevant to the PSE Security Team.
☆12Updated 2 years ago
Alternatives and similar repositories for security:
Users that are interested in security are comparing it to the libraries listed below
- ☆14Updated last year
- ☆50Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Updated 2 months ago
- BigInt library for Aztec's noir language☆32Updated last year
- Contains several examples and challenges to use Lambdaworks☆15Updated last year
- Secp256k1 Elliptic Curve Library Written In Huff☆5Updated last year
- Code used in a recent presentation showing off noir storage proofs☆14Updated last year
- ☆33Updated last year
- Axiom smart contracts☆26Updated last year
- an introduction to noir, with simple examples☆45Updated last year
- ☆40Updated 2 years ago
- Verify a chain of x509 certificates in halo2☆31Updated last year
- ☆16Updated last year
- The PSE website☆22Updated this week
- ☆28Updated 3 years ago
- ☆14Updated 4 months ago
- ☆12Updated last year
- client side proving☆28Updated last month
- Nova-based SHA256 benchmarks☆31Updated last year
- Honk Verifier in Solidity☆50Updated 6 months ago
- bn254 pairing library for Cairo Zero☆26Updated 2 years ago
- An NFT with Huff, using polynomials over a finite field with order largest prime address, instead of mappings.☆16Updated 7 months ago
- Blog☆22Updated last year
- BN254 Pairing Implementation in Noir☆22Updated last year
- Noir implementation of RSA-verify☆43Updated last year
- RLN on KZG☆20Updated last year
- repository for core circom and smart contract☆13Updated 2 years ago
- Implementing the Ethereum Virtual Machine from scratch & documenting the process☆23Updated 2 years ago
- Prove knowledge of smart contract bugs using zkEVM☆43Updated 7 months ago
- The MPC suite of tools for conducting zkSNARK Phase 2 Trusted Setup ceremonies☆16Updated 2 years ago