rymnc / poseidon-huff
☆18Updated 2 years ago
Alternatives and similar repositories for poseidon-huff:
Users that are interested in poseidon-huff are comparing it to the libraries listed below
- A set of tools for use with the huff language.☆21Updated 2 years ago
- ☆28Updated 3 years ago
- Speedrun this in Huff https://saxenism.com/web3/solidity/language-tricks/bit-magic/intermediate/2022/09/06/Bit-Magic-Solidity.html☆21Updated 2 years ago
- Then I'll huff and I'll puff and I'll blow your house in☆15Updated 2 years ago
- P256 (a.k.a. secp256r1 elliptic curve) signature verification 🐍Vyper contract.☆19Updated last week
- A puzzle for Curta CTF☆26Updated last year
- ☆13Updated 2 years ago
- Create breakpoints for use with Foundry debugger -- https://book.getfoundry.sh/cheatcodes/breakpoint☆34Updated last year
- ☆12Updated last year
- Safe multi-sig rewritten in Huff☆13Updated last year
- Groth16 verifier in EVM☆20Updated last year
- Use the EVM cache state to shim transient storage☆20Updated 2 years ago
- Yultsur is a Rust implementation of Yul.☆23Updated 3 years ago
- A persistent, robust, and composable proposal service for rollup stacks written in pure rust.☆18Updated last year
- ☆22Updated 2 years ago
- Better assertion macros for pure Huff tests.☆19Updated last year
- Succinctly prove the fundamental equation of DAI fails to hold using the Certora prover.☆15Updated 8 months ago
- A king-of-the-hill style competition, where players optimize gas challenges.☆21Updated 11 months ago
- Proof of concept trade simulation using state overrides☆22Updated 2 years ago
- This repo hosts the code for an analysis on Ethereum gas limit.☆18Updated last year
- ☆14Updated 2 years ago
- Real-time bidding API scaffold for MevWallet transactions☆18Updated last year
- optimized huff snippets☆20Updated last year
- An EVM low-level language that gives full control over the control flow of the smart contract.☆26Updated 7 months ago
- ☆35Updated 2 years ago
- ☆19Updated 11 months ago
- ☆28Updated 2 years ago
- Single owner authorization with zk-based two-factor-authorization.☆18Updated 2 years ago
- ☆23Updated last year
- Code used in a recent presentation showing off noir storage proofs☆14Updated last year