quadratic-gardens / qfiLinks
Quadratic Funding Infrastructure
☆20Updated last year
Alternatives and similar repositories for qfi
Users that are interested in qfi are comparing it to the libraries listed below
Sorting:
- Smart contracts for the Telepathy protocol☆79Updated last year
- Basic Noir private proof of membership☆90Updated 6 months ago
- RISC-V interactive fault proof tech☆106Updated 4 months ago
- ☆70Updated last year
- zkSudoku is a platform that allows users to play zk (zero knowledge) Sudoku games.☆46Updated last year
- Email verification circuit in halo2☆68Updated last year
- Leveraging zk for trustlessly selling private keys, signatures and groth16 proofs.☆92Updated 2 years ago
- Hardhat plugin to integrate Circom and SnarkJS into your build process.☆119Updated last year
- Gas-efficient and blazing fast proving for private signaling☆81Updated last year
- Like Safe... but secret 🥷🏽☆63Updated 8 months ago
- zkSNARK circuits for the Telepathy protocol☆53Updated 2 years ago
- Shield is a development framework for circom developers. The core reason is to provide libraries, plugins, and testing tools to ensure co…☆60Updated 2 years ago
- Cross-zk-rollup aggregation☆60Updated 2 years ago
- Verifiable RPC for Ethereum state, in-browser, no node☆44Updated 2 years ago
- ☆89Updated 3 years ago
- Multi proof Aggregation for Zk SNARK on Ethereum☆62Updated 2 years ago
- group signatures implemented with zkSNARKs☆85Updated 3 years ago
- Lowering client-side proving cost for private ZK signatures in circom☆111Updated 2 years ago
- ☆92Updated 2 years ago
- ZKmaps uses ZK proofs to provide a proof of location without sharing the user's actual location☆73Updated 2 years ago
- Use zk proofs of JWTs to authorize arbitrary transactions on chain. Soon to have scoped oauth'd session keys as well.☆22Updated last month
- ☆102Updated 2 years ago
- Ultimate Boilerplate for building full stack ZK decentralized application, with Circom, Snarkjs and Nextjs☆47Updated 2 years ago
- Poseidon hash function implemented in Solidity☆53Updated last year
- Sign in with Apple/Google on any EVM chain. Self-custodial.☆56Updated 6 months ago
- Circom circuits used by the iden3 core protocol.☆91Updated 2 months ago
- A system for managing privacy-preserving groups.☆76Updated 5 months ago
- ☆86Updated 2 years ago
- keccak256 hash implementation in Circom☆81Updated 3 years ago
- https://geometryresearch.xyz/notebook/zkhack-groth-challenge☆49Updated 3 years ago