Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
SNARKs for C - MaRDI portal

SNARKs for C

From MaRDI portal
Software:26503



swMATH14604MaRDI QIDQ26503


No author found.





Related Items (28)

Confidential and efficient asset proof for bitcoin exchangesArya: nearly linear-time zero-knowledge proofs for correct program execution\textsf{Mac'n'Cheese}: zero-knowledge proofs for Boolean and arithmetic circuits with nested disjunctionsOn the (In)Security of SNARKs in the Presence of OraclesBooLigero: improved sublinear zero knowledge proofs for Boolean circuitsPreprocessing succinct non-interactive arguments for rank-1 constraint satisfiability from holographic proofsStacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesScalable zero knowledge via cycles of elliptic curvesMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityThe hunting of the SNARKAn Introduction to the Use of zk-SNARKs in BlockchainsFast Reed-Solomon Interactive Oracle Proofs of ProximityShorter arithmetization of nondeterministic computationsTrusted computing with addition machines. IISublinear Zero-Knowledge Arguments for RAM ProgramsHow to build time-lock encryptionNo-signaling linear PCPsMaking the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient CircuitsEfficient non-interactive zero-knowledge proofs in cross-domains without trusted setupOn subversion-resistant SNARKsAurora: transparent succinct arguments for R1CSLibra: succinct zero-knowledge proofs with optimal prover computationPinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function EvaluationTrinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable ComputationComputational Integrity with a Public Random String from Quasi-Linear PCPsTurboIKOS: improved non-interactive zero knowledge and post-quantum signaturesAuthenticated hash tables based on cryptographic accumulators


This page was built for software: SNARKs for C