Best zkSync-era ETL ever 😜
-
Updated
Jan 4, 2024 - Python
Zero-knowledge proof (ZKP) is a cryptographic protocol where one party can prove to another party that a statement is true without revealing any information beyond the fact of the statement’s truth.
Best zkSync-era ETL ever 😜
Watermarking Deep Neural Networks (USENIX 2018)
A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private smart contracts.
A trust-less voting system based on blockchain to secure the purpose of democracy.
Zero-Knowledge Proof for Nuclear Disarmament Verification
zkpoor - Zero Knowledge Proof Of Outstanding Reserves
🐍 Python facilitation wrapper to embed 🔒 Zenroom
Osiris is a Python library designed for efficient data conversion and management, primarily transforming data into Cairo programs
Weavechain Python API
Privacy-first decentralized AI training network combining federated learning, blockchain incentives, and quantum-safe cryptography. Enable secure collaborative model development without sharing raw data.
A curated list of awesome libraries, tools, frameworks, and resources for Zero-Knowledge Proofs (ZKPs) including zk-SNARKs, zk-STARKs, and other privacy-preserving cryptographic protocols.
Useful zero-knowledge (ZK) problems constructed from real world scenarios.
Quantum-safe, bridge-free cross-chain interoperability platform using NIST PQC standards and Zero-Knowledge Proofs.
Blockchain and crypto to store and share medical records
💎HYPER-STABLE MANIFOLDS The 7D mH-Q architecture transcends standard constraint paradigms (like the late-arriving DeepSeek mHC) by introducing the **Holographic Crystal Lattice (HCL)**.
🔐 🗳️ Secure e-voting platform with Zero-Knowledge Proofs, custom AES encryption, graph isomorphism authentication, and enterprise-grade cryptographic security for tamper-proof elections.
A tool for generating dummy ballots and proofs of their correct decryption for Estonian online elections.
This repository provides a brief demonstration of the use of combined cipher methods to build a complex cryptography system.