statechannels / go-nitro
Implementation of nitro-protocol in Go
☆42Updated 8 months ago
Alternatives and similar repositories for go-nitro:
Users that are interested in go-nitro are comparing it to the libraries listed below
- Trustlessly prove a past storage value in a contract to other contracts☆145Updated 2 years ago
- ☆21Updated 3 weeks ago
- Ethereum local test chain with block reorg on-demand☆34Updated 2 years ago
- Construct a Merkle Tree database from Ethereum logs.☆66Updated last week
- Solidity proofs that a historical event occurred☆28Updated 5 years ago
- Tendermint in Solidity☆60Updated 3 years ago
- General Purpose Atomic Crosschain Transaction Protocol☆84Updated 8 months ago
- Hermez network protocol smart contracts☆37Updated 2 years ago
- Bitcoin Light Client on Ethereum☆40Updated 8 months ago
- Horizon - a trustless harmony to ethereum bridge☆36Updated 2 years ago
- A minimal KZG polynominal commitment library with a Solidity verifier☆69Updated last year
- A devp2p crawler targeted at Eth2 nodes☆59Updated last year
- 💻 Javascript Implementation of Boneh-Lynn-Shacham Signatures☆102Updated 5 months ago
- Go core implementation of the iden3 system☆93Updated 5 months ago
- Anonymous Proof of Ethereum Address Ownership☆45Updated 5 months ago
- Lurch is an Ethereum VM para-virtualization (ish) written in EVM bytecode.☆83Updated 4 years ago
- An app library to share dfuse Firehose implementation across all supported chain☆37Updated 10 months ago
- IDEN3 smartcontracts☆94Updated this week
- 🎴Zero-knowledge non-fungible tokens on Ethereum using zk-SNARKs☆93Updated 6 years ago
- A judicial inquiry into your transactions 🧑⚖️☆47Updated 3 years ago
- 2FA with Zero-Knowledge proofs☆48Updated this week
- EIP1271 signature checker implementation in JavaScript☆36Updated 4 years ago
- Proof of concept for a delegatecall proxy upgrade pattern without storage usage☆55Updated 6 months ago
- Testing EIP-4844 on EL and CL clients☆59Updated last year
- Very simple datastore☆61Updated 2 months ago
- [Optimism] Service Integration & Rapid Development☆54Updated 3 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated last month
- ☆28Updated 2 years ago
- A pure solidity implementation of elliptic curve math, parameterised for curve secp256r1 / prime256v1 / p256.☆103Updated 11 months ago
- FFT, data-recovery and KZG commitments, a.k.a. Kate commitments, in Go - *super experimental*☆90Updated last year