tiktok-privacy-innovation / trustless-attestation-verificationLinks
☆52Updated 5 months ago
Alternatives and similar repositories for trustless-attestation-verification
Users that are interested in trustless-attestation-verification are comparing it to the libraries listed below
Sorting:
- ☆56Updated last week
- Ecne: An engine for verifying the soundness of R1CS constraints☆112Updated 3 years ago
- Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.☆44Updated 11 months ago
- Automated verification of uniqueness property for ZKP circuits☆87Updated last year
- Reef: A zkSNARK system for proving that a committed document matches a regex☆74Updated last year
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆53Updated last month
- AES-GCM implementation in Circom☆38Updated 3 years ago
- Geth-in-SGX provides an example of running go-ethereum in SGX☆75Updated last year
- UPA is the proof aggregation engine built by NEBRA team.☆35Updated 4 months ago
- SMT 2023 Submission; license pending☆56Updated 10 months ago
- A Risc-V CPU implemented as a zk-SNARK☆50Updated 3 years ago
- ☆29Updated 3 weeks ago
- Circom AES-GCM circuits☆34Updated last month
- Benchmarks of popular zkVMs including Jolt☆61Updated last year
- Awesome SGX and TEE on Blockchain Resources☆24Updated 2 years ago
- Automated verification of uniqueness property for ZKP circuits☆42Updated last year
- ☆104Updated last year
- building blocks for accelerating ZK proofs over binary fields☆45Updated 3 months ago
- neural network inference standard for zero-knowledge-proof systems☆34Updated last year
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- A framework to run Fully Homomorphic Encryption computations (especially using the SEAL library) on Trusted Execution Environments, with …☆46Updated 2 years ago
- Diamond iO implementation https://eprint.iacr.org/2025/236☆81Updated 2 weeks ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆68Updated 2 years ago
- ☆48Updated 2 years ago
- A silent threshold encryption scheme, which does not require any interaction during the setup phase☆35Updated 3 months ago
- ☆27Updated last year
- Nova: Recursive SNARKs without trusted setup☆44Updated 2 years ago
- ☆25Updated 11 months ago
- Oblivious key-value store based on Circuit ORAM☆29Updated 6 months ago
- ☆23Updated 2 years ago