zk-ml / tachikomaLinks
neural network inference standard for zero-knowledge-proof systems
☆34Updated 2 years ago
Alternatives and similar repositories for tachikoma
Users that are interested in tachikoma are comparing it to the libraries listed below
Sorting:
- Gas-efficient and blazing fast proving for private signaling☆81Updated last year
- zkSNARK circuits for the Telepathy protocol☆53Updated 2 years ago
- Email verification circuit in halo2☆68Updated last year
- Benchmarking Polynomial Commitments☆51Updated 2 years ago
- Nova: Recursive SNARKs without trusted setup☆44Updated 2 years ago
- A Solidity implementation of Halo2's Pasta curves☆50Updated 2 years ago
- ☆27Updated 2 years ago
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Updated 4 months ago
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆50Updated 2 years ago
- Using folding schemes for a provable bitcoin light client☆34Updated last year
- Honk Verifier in Solidity☆50Updated last year
- Cryptographic protocols☆38Updated 2 years ago
- Library and gadget to do regex string matches in halo2☆35Updated last year
- ☆39Updated last year
- ☆33Updated 2 years ago
- ☆50Updated last year
- https://geometryresearch.xyz/notebook/zkhack-groth-challenge☆49Updated 3 years ago
- ☆40Updated 3 years ago
- Axiom smart contracts☆26Updated 2 years ago
- Nova Verifier in Circom so it can be verified onChain☆59Updated 2 years ago
- Infinitely Compressible Governance using Recursive SNARKs☆31Updated 3 years ago
- Trust-minimized commitment pools with zkSNARKs☆38Updated 2 years ago
- zero knowledge proof aggregator for general circuit☆73Updated last year
- A collection of technical notes from the Geometry research team.☆47Updated 2 years ago
- BigInt library for Aztec's noir language☆32Updated last year
- Circuits, written in circom, for Proof Of Solvency☆26Updated 2 years ago
- Danksharding Builder with GPU acceleration☆52Updated 2 years ago
- ☆34Updated 2 years ago
- Zero knowledge proofs of differential privacy mechanisms☆21Updated 2 years ago
- ☆33Updated last year