weijiekoh / perpetualpowersoftau
New repo: https://github.com/privacy-scaling-explorations/perpetualpowersoftau
☆128Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for perpetualpowersoftau
- This repository contains a tutorial on how to build roll_up with Circom☆84Updated 5 years ago
- non-custodial exchange build with rollup☆105Updated last year
- fast zksnark prover☆120Updated 11 months ago
- Implements hermez network zk-Snarks circuits☆56Updated last year
- ☆77Updated 3 years ago
- A zkSNARK toolkit to work with circom zkp DSL in plonk proof system.☆158Updated last year
- Arkworks bindings to Circom's R1CS, for Groth16 Proof and Witness generation in Rust.☆236Updated last week
- A tool to work with zkSNARK circuits generated by Circom compiler☆99Updated 2 years ago
- Bellman zkSNARK library for community with Ethereum's BN256 support☆160Updated 2 months ago
- A fast zkSnark proof generator written in native Web Assembly.☆210Updated last year
- ☆71Updated 8 months ago
- C++ elliptic curve library☆134Updated last year
- Generate & verify Merkle-Patricia-proofs for Ethereum☆106Updated last year
- FFT, data-recovery and KZG commitments, a.k.a. Kate commitments, in Go - *super experimental*☆90Updated 11 months ago
- EIP1962 implementation effort☆71Updated 4 months ago
- keccak256 hash implementation in Circom☆77Updated 2 years ago
- yellow paper for roll_up token☆67Updated 5 years ago
- Go core implementation of the iden3 system☆90Updated last month
- A curated list of awesome things related to plonk proof system☆227Updated 2 months ago
- ☆86Updated 2 years ago
- A minimal KZG polynominal commitment library with a Solidity verifier☆69Updated last year
- Implementation of Canetti-Gennaro-Goldfeder-Makriyannis-Peled threshold signing scheme☆63Updated 2 weeks ago
- ☆78Updated 3 years ago
- Big integer arithmetic and secp256k1 ECC operations in circom☆310Updated last year
- ☆117Updated 2 weeks ago
- Implementation of PLUME: nullifier friendly signature scheme on ECDSA☆134Updated 2 months ago
- ☆192Updated 11 months ago
- Recursive SNARKs based on Plonk and Halo☆112Updated 3 years ago
- Circom circuits used by the iden3 core protocol.☆82Updated 3 months ago
- Trustlessly prove a past storage value in a contract to other contracts☆144Updated last year