ZK HACK - Introducing Circom 2.0 - Iden3

Поделиться
HTML-код
  • Опубликовано: 22 окт 2024

Комментарии • 12

  • @danielus888
    @danielus888 3 года назад +2

    Thank you guys, this is a very hands on approach on the building of zk proofs not easy to find. Useful to understand the hole thing : )

  • @andriianchestnykh3673
    @andriianchestnykh3673 2 года назад +1

    Great stuff! Very helpful practical implementation of zk-SNARKs!

  • @xrplclues8330
    @xrplclues8330 Год назад

    Thanks for posting . Great video . I could not fully understand why in this example hash = pk

  • @CandyMoney1000
    @CandyMoney1000 Год назад

    Amazing explanation on the constraint operators

  • @mikestaub
    @mikestaub 3 года назад +1

    This is incredibly exciting work. Great job!

    • @zes3813
      @zes3813 Год назад

      no such thing as eclx or not

  • @isaiascobogalindo
    @isaiascobogalindo 2 года назад

    Great job. Thanks.

  • @ppoliani
    @ppoliani 2 года назад

    Nice explanation :) Would it be possible to get the latest code though? It looks like the repository is missing some documentation

  • @abhisheksinha9027
    @abhisheksinha9027 2 года назад +1

    Love you zk hack

  • @novalink90
    @novalink90 Год назад

    Can you include the link to the repo in the description? I cannot find it from google :c

  • @asmitadhungana3790
    @asmitadhungana3790 2 года назад

    Cool!

  • @bruidbarrett
    @bruidbarrett 2 года назад

    Jose is boozin