privacy-scaling-explorations / website
Privacy and Scaling Explorations
☆12Updated last year
Alternatives and similar repositories for website:
Users that are interested in website are comparing it to the libraries listed below
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆46Updated last year
- ☆48Updated 10 months ago
- polynomial commitments from linear codes☆36Updated last month
- A Solidity implementation of Halo2's Pasta curves☆48Updated last year
- In-browser ECDSA aggregation using Nova over secp/secq☆33Updated last year
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- ☆33Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆21Updated 4 months ago
- RLN circuits in Circom☆29Updated 6 months ago
- Using folding schemes for a provable bitcoin light client☆28Updated 7 months ago
- Axiom smart contracts☆26Updated last year
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Updated last year
- Polynomial Expression Engine☆34Updated 11 months ago
- Nova: Recursive SNARKs without trusted setup☆42Updated last year
- ☆17Updated last year
- zkSNARK circuits for the Telepathy protocol☆51Updated last year
- The MPC suite of tools for conducting zkSNARK Phase 2 Trusted Setup ceremonies☆16Updated last year
- ☆34Updated last year
- Proving shortest paths with recursive SNARKs☆12Updated last year
- Benchmarking Polynomial Commitments☆47Updated last year
- BigInt library for Aztec's noir language☆31Updated 10 months ago
- ☆2Updated 10 months ago
- A convenient way for developers to compile, cache, and execute circom circuits, as well as to generate proofs.☆34Updated 2 years ago
- A Rust library for proof-carrying disclosures☆20Updated 9 months ago
- ERC4337-based social recovery wallet with Noir zk-ecdsa☆21Updated last year
- ☆26Updated 10 months ago
- The PSE website☆20Updated 3 weeks ago
- Client library for generating and using RLN ZK proofs☆30Updated last year
- ☆33Updated last year
- Cryptographic protocols☆37Updated last year