weijiekoh / poseidon-encryption-circomLinks
Poseidon encryption in Typescript and circom (decryption only) on the BN254 elliptic curve
☆13Updated last year
Alternatives and similar repositories for poseidon-encryption-circom
Users that are interested in poseidon-encryption-circom are comparing it to the libraries listed below
Sorting:
- ☆23Updated 4 years ago
- Nova: Recursive SNARKs without trusted setup☆43Updated last year
- An example of how to build an end-to-end dApp with plonky2x☆22Updated last year
- ☆15Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Updated 2 months ago
- ☆33Updated last year
- ECDSA gadgets for plonky2☆18Updated last year
- A Rust library for proof-carrying disclosures☆20Updated last year
- zk-Snarks circuit for franchise proof☆13Updated last year
- ☆20Updated last year
- STARK book☆20Updated 8 months ago
- Plonky2 gadgets for EcGFp5 curve and base field arithmetic☆20Updated 2 years ago
- Solidity verifier for Plonk☆42Updated 9 months ago
- RLN circuits in Circom☆29Updated 10 months ago
- ☆16Updated last year
- Plonky2 Semaphore example for ZKHack☆26Updated 3 years ago
- polynomial commitments from linear codes☆44Updated 5 months ago
- plonky2 implementation of bn254 pairing☆18Updated last year
- A collection of the Notes on the Nova folding scheme explained from scratch☆28Updated 11 months ago
- ☆17Updated 2 years ago
- zkSNARK circuits for the Telepathy protocol☆53Updated last year
- Some very rough benchmarks between sha256 circuits in different proving systems☆52Updated 2 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Updated last year
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆48Updated last year
- Using folding schemes for a provable bitcoin light client☆34Updated last year
- Implementation of Nova using arkworks for learning purposes. https://eprint.iacr.org/2021/370.pdf☆45Updated 2 years ago
- ☆33Updated last year
- Rescue and Poseidon hash function implementations☆43Updated 9 months ago
- Extractable Witness Encryption for KZG Commitments☆29Updated 6 months ago
- Kate commitment based PLONK recursive aggregation circuit☆40Updated last year