zama-ai / fhevm-test-suiteLinks
Test suite for fhevm
☆26Updated 7 months ago
Alternatives and similar repositories for fhevm-test-suite
Users that are interested in fhevm-test-suite are comparing it to the libraries listed below
Sorting:
- Threshold MPC protocols for FHE☆56Updated 4 months ago
- A curated list of amazing Fully Homomorphic Encryption (FHE) resources created by the team at Zama.☆430Updated this week
- A Solidity library for interacting with fhevm.☆509Updated 6 months ago
- A dapp SDK for the FHEVM protocol.☆61Updated this week
- Prototype implementations of various Collaborative zkSNARKs.☆130Updated 6 months ago
- Key Management System for the Zama Protocol.☆56Updated last week
- Zama's Homomorphic Processing Unit implementation on FPGA☆211Updated 3 weeks ago
- A curated list of awesome Fully Homomorphic Encryption (FHE) x Blockchain resources, libraries, projects, and more.☆62Updated last year
- Experimental folding schemes library☆259Updated this week
- Expander, an open-source GKR prover designed for scaling large-scale parallel computing.☆138Updated 3 months ago
- ☆221Updated 4 months ago
- ☆318Updated this week
- A lattice-based non-interactive folding scheme written in Rust☆114Updated last week
- ☆131Updated last year
- ☆238Updated 5 months ago
- A ZKP-augmented fork of the OpenFHE library☆22Updated last year
- Verifiable FHE prototype☆27Updated last year
- Tooling for creating collaborative SNARKs for Circom and Noir circuits.☆204Updated this week
- A Plonkish folding framework for Incrementally Verifiable Computation (IVC).☆177Updated 9 months ago
- ☆82Updated 11 months ago
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆46Updated 7 months ago
- Multi-party computation libraries written in Rust 🦀☆283Updated this week
- A repo for our research papers☆241Updated 6 months ago
- A STARK-based VM focused on code reuse, performance, and modularity☆337Updated 4 months ago
- We are a community of researchers and developers interested in advancing homomorphic encryption and other secure computation techniques.☆65Updated last week
- Interfaces and implementations of cryptographic primitives, along with R1CS constraints for them☆231Updated 5 months ago
- A hardware acceleration library for compute intensive cryptography☆466Updated last month
- Minimal pure-Python implementation of a secure multi-party computation (MPC) protocol for evaluating arithmetic sum-of-products expressio…☆66Updated last year
- Prove Cairo programs with the blazing-fast S-two prover, powered by the cryptographic breakthrough of Circle STARKs.☆261Updated this week
- Monorepo of halo2 crates☆300Updated 4 months ago