privacy-scaling-explorations / website
Privacy and Scaling Explorations
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for website
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆47Updated last year
- ☆46Updated 8 months ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- ☆37Updated 10 months ago
- Nova: Recursive SNARKs without trusted setup☆43Updated last year
- ☆32Updated last year
- RLN circuits in Circom☆29Updated 4 months ago
- ☆32Updated 10 months ago
- BigInt library for Aztec's noir language☆31Updated 8 months ago
- Private authentic photo sharing using ZKP☆22Updated last year
- In-browser ECDSA aggregation using Nova over secp/secq☆34Updated last year
- Verify a chain of x509 certificates in halo2☆32Updated 11 months ago
- Honk Verifier in Solidity☆49Updated last month
- ☆39Updated 2 years ago
- an introduction to noir, with simple examples☆42Updated 10 months ago
- polynomial commitments from linear codes☆37Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆21Updated 2 months ago
- KZG commitments over BLS12-381☆32Updated 2 years ago
- A Solidity implementation of Halo2's Pasta curves☆48Updated last year
- An example of how to build an end-to-end dApp with plonky2x☆22Updated last year
- ERC4337-based social recovery wallet with Noir zk-ecdsa☆21Updated last year
- zkSNARK circuits for the Telepathy protocol☆51Updated last year
- ☆34Updated last year
- Proving shortest paths with recursive SNARKs☆12Updated last year
- Polynomial Expression Engine☆34Updated 9 months ago
- Nova Verifier in Circom so it can be verified onChain☆58Updated last year
- Verifiable FHE with GKR☆25Updated last month
- Using folding schemes for a provable bitcoin light client☆28Updated 6 months ago
- A convenient way for developers to compile, cache, and execute circom circuits, as well as to generate proofs.☆34Updated 2 years ago