weijiekoh / poseidon-encryption-circomLinks
Poseidon encryption in Typescript and circom (decryption only) on the BN254 elliptic curve
☆13Updated 2 years ago
Alternatives and similar repositories for poseidon-encryption-circom
Users that are interested in poseidon-encryption-circom are comparing it to the libraries listed below
Sorting:
- ☆17Updated 2 years ago
- Solidity verifier for Plonk☆42Updated last year
- Plonky2 Semaphore example for ZKHack☆26Updated 3 years ago
- ECDSA gadgets for plonky2☆19Updated 2 years ago
- zk-Snarks circuit for franchise proof☆13Updated last year
- zkSNARK circuits for the Telepathy protocol☆53Updated 2 years ago
- Rescue and Poseidon hash function implementations☆43Updated last year
- Using folding schemes for a provable bitcoin light client☆34Updated last year
- RLN circuits in Circom☆32Updated last year
- Batch ECDSA in circom☆34Updated 3 years ago
- Nova: Recursive SNARKs without trusted setup☆44Updated 2 years ago
- Polynomial Expression Engine☆35Updated last year
- Draft documents for standardization of Plonkish arithmetization☆23Updated last year
- Decentralised Voting Scheme☆16Updated 3 years ago
- Experimental implementation of Sumcheck protocol using CUDA☆21Updated last year
- STARK book☆20Updated last year
- Base64 encoding for Aztec's noir language☆16Updated last year
- A toolkit to compile and debug circom circuit.☆27Updated 2 years ago
- plonky2 implementation of bn254 pairing☆18Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Updated 4 months ago
- Solidity implementation of the baby jubjub curve☆21Updated last year
- An example of how to build an end-to-end dApp with plonky2x☆22Updated 2 years ago
- Curdleproofs is a zero-knowledge shuffle argument☆70Updated 2 years ago
- ☆50Updated last year
- Cryptographic protocols☆38Updated 2 years ago
- ☆23Updated 5 years ago
- Based on https://eprint.iacr.org/2022/1510☆26Updated last year
- ☆42Updated last year
- snarkpack for arkwork☆21Updated 2 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆52Updated 3 years ago