ethSTARK
Use ethSTARK to compress chains of computations of the Rescue hash function at high throughput.

Use ethSTARK to compress chains of computations of the Rescue hash function at high throughput.
Ziggy is a Post-Quantum-Secure signature scheme based on ZK-STARK.
The VeeDo protocol combines two cryptographic technologies: STARKs and VDF (Verifiable Delay Functions). VeeDo can be used to provide useful utilities such as trustless randomness, as well as a timelock.