uinb / fusotao
The Fusotao node.
☆50Updated last year
Alternatives and similar repositories for fusotao
Users that are interested in fusotao are comparing it to the libraries listed below
Sorting:
- Configurable Asset Privacy☆34Updated last year
- Mirror of development repo: https://github.com/Cardinal-Cryptography/aleph-node☆92Updated last month
- Configurable Asset Privacy for Ethereum☆98Updated last year
- AppliedZKP's zkEVM Documentation☆25Updated 10 months ago
- Celestia -> EVM bridge☆135Updated last week
- ☆80Updated 4 years ago
- ☆83Updated 10 months ago
- ☆56Updated last year
- Bridge interface allows users to transfer ERC20 tokens from Ethereum to StarkNet and vice versa.☆153Updated this week
- A trustless, cross-chain bridging protocol.☆85Updated 3 months ago
- zkevm-chain: Deprecated☆89Updated last year
- Mangata Substrate☆88Updated 3 months ago
- A decentralized ZK Rollup AMM written in Cairo for StarkNet.☆59Updated last year
- Mirror of AztecProtocol/aztec-packages/aztec-nr☆116Updated this week
- 🚀 Pontem Parachain node with Move VM onboard.☆78Updated 2 years ago
- Composable smart contract hosting with fail-safe interoperable execution☆159Updated last week
- zkEVM proof generator reference written in Javascript☆81Updated this week
- Based on Wormhole/LayerZero, an omnichain interoperability protocol,users can swap any token between any chain with one click.☆81Updated 2 months ago
- KYVE - A protocol for verified data-streams☆73Updated 3 years ago
- Signatures, keys and Pedersen hash on STARK friendly elliptic curve☆55Updated last year
- ☆32Updated 7 months ago
- ☆52Updated this week
- Forta Detection Bot SDK and CLI tool☆72Updated last year
- ☆75Updated 2 years ago
- Compress cryptographic outputs via mining☆23Updated 2 years ago
- On-chain bets on Sui.☆49Updated 2 months ago
- Reference implementation of the node for the Miden blockchain☆63Updated this week
- Docker image exposing celestia-node devnet for CI and local development☆25Updated 10 months ago
- ☆101Updated last month
- prism is the first trust-minimized key-transparency solution, allowing for automatic verification of service providers via light clients.…☆96Updated this week